Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fpY3HP2cnH.exe

Overview

General Information

Sample name:fpY3HP2cnH.exe
renamed because original name is a hash value
Original sample name:e75baeba1dbbfe5b5d9cb8b865aa504329ec50c4df9ba56fb0dcb03278f9a3b0.exe
Analysis ID:1589014
MD5:68676f1fc74ca8f74a4822c9c0042eaf
SHA1:0d7aa8fbbcf7a7babf7bddf3d4bac19884a1370e
SHA256:e75baeba1dbbfe5b5d9cb8b865aa504329ec50c4df9ba56fb0dcb03278f9a3b0
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Detected potential unwanted application
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • fpY3HP2cnH.exe (PID: 4784 cmdline: "C:\Users\user\Desktop\fpY3HP2cnH.exe" MD5: 68676F1FC74CA8F74A4822C9C0042EAF)
    • RegAsm.exe (PID: 364 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.horeca-bucuresti.ro", "Username": "biggiemma@horeca-bucuresti.ro", "Password": "e)rWKbKP8~mO"}
SourceRuleDescriptionAuthorStrings
00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.2152942222.0000000002AD2000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.fpY3HP2cnH.exe.2ad0000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.fpY3HP2cnH.exe.2ad0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.2.fpY3HP2cnH.exe.2ad0000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.fpY3HP2cnH.exe.2ad0000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x3441f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x34491:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x3451b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x345ad:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x34617:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x34689:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x3471f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x347af:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.fpY3HP2cnH.exe.2ad0000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x31619:$s2: GetPrivateProfileString
                  • 0x30cdd:$s3: get_OSFullName
                  • 0x32362:$s5: remove_Key
                  • 0x32503:$s5: remove_Key
                  • 0x333f0:$s6: FtpWebRequest
                  • 0x34401:$s7: logins
                  • 0x34973:$s7: logins
                  • 0x37684:$s7: logins
                  • 0x37736:$s7: logins
                  • 0x39089:$s7: logins
                  • 0x382d0:$s9: 1.85 (Hash, version 2, native byte-order)
                  Click to see the 5 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 2.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.horeca-bucuresti.ro", "Username": "biggiemma@horeca-bucuresti.ro", "Password": "e)rWKbKP8~mO"}
                  Source: fpY3HP2cnH.exeVirustotal: Detection: 75%Perma Link
                  Source: fpY3HP2cnH.exeReversingLabs: Detection: 78%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: fpY3HP2cnH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

                  Networking

                  barindex
                  Source: Yara matchFile source: 0.2.fpY3HP2cnH.exe.2ad0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                  Source: RegAsm.exe, 00000002.00000002.4600404823.00000000032E2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.0000000003221000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.00000000032FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: fpY3HP2cnH.exe, 00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmp, fpY3HP2cnH.exe, 00000000.00000002.2152942222.0000000002AD2000.00000040.10000000.00040000.00000000.sdmp, fpY3HP2cnH.exe, 00000000.00000003.2149530518.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.00000000032E2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.0000000003221000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4599576410.00000000011EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegAsm.exe, 00000002.00000002.4599749553.00000000012B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingl
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://ocsp.comodoca.com0
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://ocsp.digicert.com0A
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://ocsp.digicert.com0C
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://ocsp.digicert.com0X
                  Source: fpY3HP2cnH.exeString found in binary or memory: http://ocsp.sectigo.com0
                  Source: RegAsm.exe, 00000002.00000002.4600404823.00000000032E2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.0000000003221000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: fpY3HP2cnH.exe, 00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmp, fpY3HP2cnH.exe, 00000000.00000002.2152942222.0000000002AD2000.00000040.10000000.00040000.00000000.sdmp, fpY3HP2cnH.exe, 00000000.00000003.2149530518.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: fpY3HP2cnH.exeString found in binary or memory: https://sectigo.com/CPS0

                  System Summary

                  barindex
                  Source: 0.2.fpY3HP2cnH.exe.2ad0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.fpY3HP2cnH.exe.2ad0000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: fpY3HP2cnH.exePE Siganture Subject Chain: CN=Tim Kosse, O=Tim Kosse, S=Nordrhein-Westfalen, C=DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E84B490 __vbaFreeVar,NtSetInformationProcess,0_2_7E84B490
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E6529DB NtAllocateVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,0_2_7E6529DB
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E652BA8 NtQueryInformationProcess,0_2_7E652BA8
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC2D06 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC2D06
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC06BB NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC06BB
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC069B NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC069B
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC06FF NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC06FF
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC02F0 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC02F0
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC06D9 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC06D9
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC024E NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC024E
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC1FB3 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC1FB3
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC07EE NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC07EE
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC17F7 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC17F7
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC0360 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC0360
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC075F NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC075F
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC0C98 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC0C98
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC2C91 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC2C91
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC1CE8 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC1CE8
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC20C4 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC20C4
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC2CDF NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC2CDF
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC01A0 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC01A0
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC012B NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC012B
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC115C NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02AC115C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445C48 NtProtectVirtualMemory,2_2_00445C48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443065 NtClose,2_2_00443065
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445C68 NtProtectVirtualMemory,2_2_00445C68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00444184 NtDelayExecution,2_2_00444184
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445373 NtAllocateVirtualMemory,2_2_00445373
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445B28 NtAllocateVirtualMemory,2_2_00445B28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00444154 NtDelayExecution,2_2_00444154
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443D29 NtDelayExecution,2_2_00443D29
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443B0D NtClose,2_2_00443B0D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445B92 NtAllocateVirtualMemory,2_2_00445B92
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0156A6BD2_2_0156A6BD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0156D8902_2_0156D890
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_01564A882_2_01564A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_01563E702_2_01563E70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_015641B82_2_015641B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_069B11302_2_069B1130
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_069B3A882_2_069B3A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_069B33A02_2_069B33A0
                  Source: fpY3HP2cnH.exeStatic PE information: invalid certificate
                  Source: fpY3HP2cnH.exe, 00000000.00000000.2125006842.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameacvm7qw909e.exe vs fpY3HP2cnH.exe
                  Source: fpY3HP2cnH.exe, 00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefc288b27-c6cf-4c74-9578-1c1adc1c204c.exe4 vs fpY3HP2cnH.exe
                  Source: fpY3HP2cnH.exe, 00000000.00000003.2149530518.0000000002B61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefc288b27-c6cf-4c74-9578-1c1adc1c204c.exe4 vs fpY3HP2cnH.exe
                  Source: fpY3HP2cnH.exe, 00000000.00000002.2152629505.0000000000780000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefc288b27-c6cf-4c74-9578-1c1adc1c204c.exe4 vs fpY3HP2cnH.exe
                  Source: fpY3HP2cnH.exe, 00000000.00000002.2152942222.0000000002B0E000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamefc288b27-c6cf-4c74-9578-1c1adc1c204c.exe4 vs fpY3HP2cnH.exe
                  Source: fpY3HP2cnH.exeBinary or memory string: OriginalFilenameacvm7qw909e.exeH0 vs fpY3HP2cnH.exe
                  Source: fpY3HP2cnH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: 0.2.fpY3HP2cnH.exe.2ad0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.fpY3HP2cnH.exe.2ad0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\21c8026919fd094ab07ec3c180a9f210_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                  Source: fpY3HP2cnH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegAsm.exe, 00000002.00000002.4600404823.000000000331A000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.000000000332C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: fpY3HP2cnH.exeVirustotal: Detection: 75%
                  Source: fpY3HP2cnH.exeReversingLabs: Detection: 78%
                  Source: unknownProcess created: C:\Users\user\Desktop\fpY3HP2cnH.exe "C:\Users\user\Desktop\fpY3HP2cnH.exe"
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: msvbvm60.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: vb6zz.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: vb6de.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: vb6de.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0BE35204-8F91-11CE-9DE3-00AA004BB851}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: fpY3HP2cnH.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: fpY3HP2cnH.exeStatic PE information: Image base 0x7e650000 > 0x60000000
                  Source: fpY3HP2cnH.exeStatic file information: File size 2531400 > 1048576
                  Source: fpY3HP2cnH.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x262000
                  Source: fpY3HP2cnH.exeStatic PE information: real checksum: 0x279265 should be: 0x26eac5
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E660442 push cs; retf 0_2_7E66044C
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E65D130 push esp; iretd 0_2_7E65D131
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E65E330 push esp; iretd 0_2_7E65E331
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E65CFC8 pushad ; ret 0_2_7E65CFC9
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E65D190 push esp; iretd 0_2_7E65D191
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC57BA push esp; retf 0_2_02AC57BB
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC3FBB push eax; retf 0_2_02AC3FBC
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC3CE5 push ebx; iretd 0_2_02AC3CE6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00442C9C push eax; retf 2_2_00442C9D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00444C9E push edx; iretd 2_2_00444CC9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044449B push esp; retf 2_2_0044449C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044512E push ebx; ret 2_2_00445149
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004429C6 push ebx; iretd 2_2_004429C7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_069BCA10 push es; ret 2_2_069BCA20
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: fpY3HP2cnH.exe, 00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmp, fpY3HP2cnH.exe, 00000000.00000002.2152942222.0000000002AD2000.00000040.10000000.00040000.00000000.sdmp, fpY3HP2cnH.exe, 00000000.00000003.2149530518.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.0000000003255000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.00000000032FC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 1540000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3220000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3170000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 8055Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6736Thread sleep count: 1938 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6736Thread sleep time: -1938000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6736Thread sleep count: 8055 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6736Thread sleep time: -8055000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                  Source: RegAsm.exe, 00000002.00000002.4600404823.00000000032FC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegAsm.exe, 00000002.00000002.4600404823.00000000032FC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: RegAsm.exe, 00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: RegAsm.exe, 00000002.00000002.4601543206.0000000006500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllb
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_01567070 CheckRemoteDebuggerPresent,2_2_01567070
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E652C36 mov eax, dword ptr fs:[00000030h]0_2_7E652C36
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E652CA8 mov eax, dword ptr fs:[00000030h]0_2_7E652CA8
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E652CBC mov eax, dword ptr fs:[00000030h]0_2_7E652CBC
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E652C93 mov eax, dword ptr fs:[00000030h]0_2_7E652C93
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_7E652F91 mov eax, dword ptr fs:[00000030h]0_2_7E652F91
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC2D06 mov eax, dword ptr fs:[00000030h]0_2_02AC2D06
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC32D7 mov eax, dword ptr fs:[00000030h]0_2_02AC32D7
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC67A6 mov eax, dword ptr fs:[00000030h]0_2_02AC67A6
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC4384 mov ecx, dword ptr fs:[00000030h]0_2_02AC4384
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC671F mov eax, dword ptr fs:[00000030h]0_2_02AC671F
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeCode function: 0_2_02AC65B4 mov eax, dword ptr fs:[00000030h]0_2_02AC65B4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443065 mov ecx, dword ptr fs:[00000030h]2_2_00443065
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445400 mov eax, dword ptr fs:[00000030h]2_2_00445400
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445410 mov ecx, dword ptr fs:[00000030h]2_2_00445410
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445487 mov eax, dword ptr fs:[00000030h]2_2_00445487
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004454B3 mov eax, dword ptr fs:[00000030h]2_2_004454B3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044552B mov eax, dword ptr fs:[00000030h]2_2_0044552B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445E56 mov ecx, dword ptr fs:[00000030h]2_2_00445E56
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445639 mov eax, dword ptr fs:[00000030h]2_2_00445639
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004452CF mov ecx, dword ptr fs:[00000030h]2_2_004452CF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004452FA mov ecx, dword ptr fs:[00000030h]2_2_004452FA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445295 mov eax, dword ptr fs:[00000030h]2_2_00445295
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445327 mov ecx, dword ptr fs:[00000030h]2_2_00445327
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: F91008Jump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\fpY3HP2cnH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.fpY3HP2cnH.exe.2ad0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2152942222.0000000002AD2000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2149530518.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: fpY3HP2cnH.exe PID: 4784, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 364, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 0.2.fpY3HP2cnH.exe.2ad0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2152942222.0000000002AD2000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2149530518.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4600404823.0000000003255000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: fpY3HP2cnH.exe PID: 4784, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 364, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.fpY3HP2cnH.exe.2ad0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2152942222.0000000002AD2000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2149530518.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: fpY3HP2cnH.exe PID: 4784, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 364, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  211
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  531
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  25
                  Virtualization/Sandbox Evasion
                  LSASS Memory25
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Disable or Modify Tools
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Data from Local System
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
                  Process Injection
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Obfuscated Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials1
                  File and Directory Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync34
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  fpY3HP2cnH.exe75%VirustotalBrowse
                  fpY3HP2cnH.exe79%ReversingLabsWin32.Trojan.AgentTesla
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#fpY3HP2cnH.exefalse
                        high
                        https://sectigo.com/CPS0fpY3HP2cnH.exefalse
                          high
                          http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#fpY3HP2cnH.exefalse
                            high
                            https://account.dyn.com/fpY3HP2cnH.exe, 00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmp, fpY3HP2cnH.exe, 00000000.00000002.2152942222.0000000002AD2000.00000040.10000000.00040000.00000000.sdmp, fpY3HP2cnH.exe, 00000000.00000003.2149530518.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yfpY3HP2cnH.exefalse
                                high
                                http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0fpY3HP2cnH.exefalse
                                  high
                                  http://ocsp.sectigo.com0fpY3HP2cnH.exefalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000002.00000002.4600404823.00000000032E2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.0000000003221000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://ip-api.com/line/?fields=hostinglRegAsm.exe, 00000002.00000002.4599749553.00000000012B7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://ip-api.comRegAsm.exe, 00000002.00000002.4600404823.00000000032E2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.0000000003221000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4600404823.00000000032FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          208.95.112.1
                                          ip-api.comUnited States
                                          53334TUT-ASUSfalse
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1589014
                                          Start date and time:2025-01-11 08:25:29 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 6m 53s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:5
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:fpY3HP2cnH.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:e75baeba1dbbfe5b5d9cb8b865aa504329ec50c4df9ba56fb0dcb03278f9a3b0.exe
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 82%
                                          • Number of executed functions: 40
                                          • Number of non-executed functions: 23
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50, 4.245.163.56
                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                          TimeTypeDescription
                                          02:26:55API Interceptor1267365x Sleep call for process: RegAsm.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          208.95.112.14287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          aik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                                          • ip-api.com/json/
                                          DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • ip-api.com/line/?fields=hosting
                                          YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ip-api.com4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          aik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                                          • 208.95.112.1
                                          DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • 208.95.112.1
                                          tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 208.95.112.1
                                          YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          TUT-ASUS4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          aik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                                          • 208.95.112.1
                                          DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • 208.95.112.1
                                          tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 208.95.112.1
                                          YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\fpY3HP2cnH.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):49
                                          Entropy (8bit):1.2701062923235522
                                          Encrypted:false
                                          SSDEEP:3:/l1PL3n:fPL3
                                          MD5:CD8FA61AD2906643348EEF98A988B873
                                          SHA1:0B10E2F323B5C73F3A6EA348633B62AE522DDF39
                                          SHA-256:49A11A24821F2504B8C91BA9D8A6BD6F421ED2F0212C1C771BF1CAC9DE32AD75
                                          SHA-512:1E6F44AB3231232221CF0F4268E96A13C82E3F96249D7963B78805B693B52D3EBDABF873DB240813DF606D8C207BD2859338D67BA94F33ECBA43EA9A4FEFA086
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview:........................................user.
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):7.294386286837806
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.94%
                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • VXD Driver (31/22) 0.00%
                                          File name:fpY3HP2cnH.exe
                                          File size:2'531'400 bytes
                                          MD5:68676f1fc74ca8f74a4822c9c0042eaf
                                          SHA1:0d7aa8fbbcf7a7babf7bddf3d4bac19884a1370e
                                          SHA256:e75baeba1dbbfe5b5d9cb8b865aa504329ec50c4df9ba56fb0dcb03278f9a3b0
                                          SHA512:cafa516c55d669e7bf37e52bd60fe53fe687defd5615a87480c7e2644569bce5039a20b41f2d1370ba2a02cfd95bf12dad6459209d0348049ed865b9c7a253d5
                                          SSDEEP:49152:l3AQbdYAm4zEbdYAm4zWbdYAm4z23Aw3AWbdYAm4zSbdYAm4zO3AWypvLe6mTPLc:hAadrWdr0drkAiA0dr4dr8AJTmbI
                                          TLSH:5CC5D003B2444FA8CB450730EDDF85F0B3125DDA6B169B9E738EB2025BFA186967E453
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....AOg................. &..@........%......0&...e~..........................&.....e.'....................................
                                          Icon Hash:ab99b7abbbbfef6e
                                          Entrypoint:0x7e8af4e0
                                          Entrypoint Section:.text
                                          Digitally signed:true
                                          Imagebase:0x7e650000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:
                                          Time Stamp:0x674F41AC [Tue Dec 3 17:36:44 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:d9578469d410b115a40f3477df2f6843
                                          Signature Valid:false
                                          Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                          Signature Validation Error:The digital signature of the object did not verify
                                          Error Number:-2146869232
                                          Not Before, Not After
                                          • 18/02/2022 01:00:00 18/02/2025 00:59:59
                                          Subject Chain
                                          • CN=Tim Kosse, O=Tim Kosse, S=Nordrhein-Westfalen, C=DE
                                          Version:3
                                          Thumbprint MD5:D2F88AEA5C53DD7092E3CD7246907BE2
                                          Thumbprint SHA-1:E57CE01F6A5E1D4C522BC68488AF53D9BAD13AB7
                                          Thumbprint SHA-256:ED619A9A79713E12FFB757CF8A51BBA89FBB967EC6223C653F1F8932B0E2A25A
                                          Serial:31830C370AD7E497633B6EB3A02D69E6
                                          Instruction
                                          jmp 00007F461899E1BCh
                                          add byte ptr [eax-4E1520D1h], ch
                                          aad 34h
                                          and ecx, dword ptr [edi]
                                          mov ebp, 5562D7D3h
                                          call 00007F45F1208A8Ch
                                          out C5h, eax
                                          aaa
                                          xchg eax, ebx
                                          ret
                                          inc edx
                                          push es
                                          int 97h
                                          or ecx, dword ptr [edx]
                                          cmp dword ptr [ebx], esp
                                          jc 00007F4618BFA2E8h
                                          aam 9Eh
                                          cmpsd
                                          xchg eax, ebx
                                          sbb ebp, esi
                                          pop es
                                          cmp eax, E04CF650h
                                          mov edx, E5E2D6C2h
                                          fucompp
                                          cmp edx, ebx
                                          jne 00007F4618BFA301h
                                          mov cl, 72h
                                          les esi, fword ptr [edx-5BDA81D8h]
                                          rcr dword ptr [ecx], cl
                                          insd
                                          sbb dword ptr [edi-1Dh], esi
                                          sub byte ptr [eax-312DC24Fh], cl
                                          xor dword ptr [edi-7E0692E5h], ecx
                                          sub esi, eax
                                          lahf
                                          inc ebx
                                          aad 64h
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x2627c40x3c.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x2680000x2898.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x2670000x3048
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x1a4.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x261f100x262000236cfe2c3f0e36e394ec783218e8ea7bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .data0x2630000x4c140x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x2680000x28980x30009f1cb4ba3ff059fba627e8dda20f75d1False0.16015625data4.31958223772891IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x2680e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.16659751037344397
                                          RT_GROUP_ICON0x26a6900x14data1.15
                                          RT_VERSION0x26a6a40x1f4dataGermanGermany0.5
                                          DLLImport
                                          KERNEL32.DLLGetProcAddress, GetModuleHandleW
                                          MSVBVM60.DLL__vbaVarSub, __vbaVarTstGt, __vbaStrI2, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaFreeVar, __vbaAryMove, __vbaLineInputStr, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenVar, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaRefVarAry, __vbaBoolVarNull, _CIsin, __vbaVargVarMove, __vbaVarCmpGt, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaStrCmp, __vbaVarTstEq, DllFunctionCall, __vbaVarOr, __vbaRedimPreserve, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, __vbaNew, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaUbound, __vbaVarCat, _CIlog, __vbaFileOpen, __vbaVar2Vec, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaAryLock, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaVarCopy, _CIatan, __vbaStrMove, __vbaCastObj, __vbaR8IntI4, __vbaStrVarCopy, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeObj, __vbaFreeStr
                                          Language of compilation systemCountry where language is spokenMap
                                          GermanGermany
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 11, 2025 08:26:24.183528900 CET4971580192.168.2.6208.95.112.1
                                          Jan 11, 2025 08:26:24.188410044 CET8049715208.95.112.1192.168.2.6
                                          Jan 11, 2025 08:26:24.188551903 CET4971580192.168.2.6208.95.112.1
                                          Jan 11, 2025 08:26:24.189555883 CET4971580192.168.2.6208.95.112.1
                                          Jan 11, 2025 08:26:24.194314003 CET8049715208.95.112.1192.168.2.6
                                          Jan 11, 2025 08:26:24.672301054 CET8049715208.95.112.1192.168.2.6
                                          Jan 11, 2025 08:26:24.722290039 CET4971580192.168.2.6208.95.112.1
                                          Jan 11, 2025 08:27:26.966502905 CET8049715208.95.112.1192.168.2.6
                                          Jan 11, 2025 08:27:26.970578909 CET4971580192.168.2.6208.95.112.1
                                          Jan 11, 2025 08:28:04.696120977 CET4971580192.168.2.6208.95.112.1
                                          Jan 11, 2025 08:28:04.701244116 CET8049715208.95.112.1192.168.2.6
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 11, 2025 08:26:24.169389009 CET5918453192.168.2.61.1.1.1
                                          Jan 11, 2025 08:26:24.177768946 CET53591841.1.1.1192.168.2.6
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jan 11, 2025 08:26:24.169389009 CET192.168.2.61.1.1.10xdafaStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jan 11, 2025 08:26:24.177768946 CET1.1.1.1192.168.2.60xdafaNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                          • ip-api.com
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.649715208.95.112.180364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 11, 2025 08:26:24.189555883 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                          Host: ip-api.com
                                          Connection: Keep-Alive
                                          Jan 11, 2025 08:26:24.672301054 CET175INHTTP/1.1 200 OK
                                          Date: Sat, 11 Jan 2025 07:26:23 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Content-Length: 6
                                          Access-Control-Allow-Origin: *
                                          X-Ttl: 60
                                          X-Rl: 44
                                          Data Raw: 66 61 6c 73 65 0a
                                          Data Ascii: false


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:02:26:20
                                          Start date:11/01/2025
                                          Path:C:\Users\user\Desktop\fpY3HP2cnH.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\fpY3HP2cnH.exe"
                                          Imagebase:0x7e650000
                                          File size:2'531'400 bytes
                                          MD5 hash:68676F1FC74CA8F74A4822C9C0042EAF
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.2149863864.0000000000745000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2152942222.0000000002AD2000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2152942222.0000000002AD2000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.2149530518.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.2149530518.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:02:26:22
                                          Start date:11/01/2025
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                          Imagebase:0xd90000
                                          File size:65'440 bytes
                                          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4599419545.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4600404823.0000000003255000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:9.1%
                                            Dynamic/Decrypted Code Coverage:30%
                                            Signature Coverage:21.5%
                                            Total number of Nodes:367
                                            Total number of Limit Nodes:14
                                            execution_graph 3785 2ac012b 3788 2ac0138 3785->3788 3786 2ac2d46 3787 2ac32d7 GetPEB 3786->3787 3789 2ac31cb 3786->3789 3791 2ac2d61 3787->3791 3788->3786 3790 2ac32d7 GetPEB 3788->3790 3790->3786 3791->3789 3792 2ac2ecd NtCreateSection 3791->3792 3792->3789 3793 2ac2f04 NtMapViewOfSection 3792->3793 3793->3789 3794 2ac2f2c 3793->3794 3795 2ac308f GetPEB 3794->3795 3799 2ac2fca CreateProcessW 3794->3799 3795->3799 3797 2ac30d5 NtGetContextThread 3798 2ac30f6 NtReadVirtualMemory 3797->3798 3797->3799 3798->3799 3800 2ac311c NtWriteVirtualMemory 3798->3800 3799->3789 3799->3797 3800->3799 3801 2ac3142 NtUnmapViewOfSection NtMapViewOfSection 3800->3801 3801->3799 3802 2ac3176 NtSetContextThread 3801->3802 3802->3799 3803 2ac31a7 NtResumeThread 3802->3803 3803->3789 3803->3799 3432 7e65d42d 3433 7e843c20 3432->3433 3434 7e843c6d __vbaHresultCheckObj 3433->3434 3435 7e843c7f 3433->3435 3434->3435 3686 2ac67a6 GetPEB 3687 2ac6b40 3686->3687 3687->3687 3317 7e652ba8 3318 7e652bb1 3317->3318 3319 7e652bde NtQueryInformationProcess 3317->3319 3318->3319 3320 7e652bb7 3318->3320 3319->3320 3707 7e65b375 3708 7e8444d0 19 API calls 3707->3708 3710 7e84a060 9 API calls 3708->3710 3711 7e8445f9 __vbaStrVarMove __vbaStrMove __vbaFreeStrList __vbaFreeVarList 3710->3711 3712 7e84469f 3711->3712 3463 7e652c36 GetPEB 3464 7e652c44 3463->3464 3828 7e65d9b1 3829 7e84a6d0 #593 3828->3829 3830 7e84a734 3829->3830 3831 7e84a728 __vbaNew2 3829->3831 3832 7e84a755 __vbaR8IntI4 __vbaFreeVar 3830->3832 3833 7e84a746 __vbaHresultCheckObj 3830->3833 3831->3830 3834 7e84a78c 3832->3834 3835 7e84a77c __vbaNew2 3832->3835 3833->3832 3836 7e84a7a1 __vbaHresultCheckObj 3834->3836 3837 7e84a7b3 3834->3837 3835->3834 3836->3837 3321 2ac06bb 3325 2ac0a57 3321->3325 3322 2ac29eb 3323 2ac2d46 3324 2ac32d7 GetPEB 3323->3324 3326 2ac31cb 3323->3326 3328 2ac2d61 3324->3328 3325->3322 3325->3323 3327 2ac32d7 GetPEB 3325->3327 3327->3323 3328->3326 3329 2ac2ecd NtCreateSection 3328->3329 3329->3326 3330 2ac2f04 NtMapViewOfSection 3329->3330 3330->3326 3331 2ac2f2c 3330->3331 3332 2ac308f GetPEB 3331->3332 3336 2ac2fca CreateProcessW 3331->3336 3332->3336 3334 2ac30d5 NtGetContextThread 3335 2ac30f6 NtReadVirtualMemory 3334->3335 3334->3336 3335->3336 3337 2ac311c NtWriteVirtualMemory 3335->3337 3336->3326 3336->3334 3337->3336 3338 2ac3142 NtUnmapViewOfSection NtMapViewOfSection 3337->3338 3338->3336 3339 2ac3176 NtSetContextThread 3338->3339 3339->3336 3340 2ac31a7 NtResumeThread 3339->3340 3340->3326 3340->3336 3219 7e65baf9 3220 7e84b2d0 __vbaFreeVar 3219->3220 3229 7e84b410 3220->3229 3225 7e84b32e 3273 7e84b490 3225->3273 3277 7e6529db 3229->3277 3232 7e846120 19 API calls 3288 7e84a060 __vbaVarDup #653 __vbaI4Var __vbaFreeVar 3232->3288 3234 7e8462ab 45 API calls 3237 7e8464ba 3234->3237 3235 7e8464d2 __vbaAryLock #644 __vbaAryUnlock 3235->3237 3236 7e846533 __vbaObjSetAddref #644 __vbaFreeObj #644 3293 7e6530ab 3236->3293 3237->3235 3237->3236 3239 7e84657b __vbaAryLock #644 __vbaAryUnlock #644 3294 7e65308e 3239->3294 3241 7e8465d1 __vbaRedim #644 3295 7e65308e 3241->3295 3243 7e84661f #644 3296 7e65308e 3243->3296 3245 7e84664c __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 3246 7e8466d2 __vbaAryUnlock __vbaFreeStr #644 3245->3246 3247 7e8466bb __vbaHresultCheckObj 3245->3247 3251 7e846707 3246->3251 3247->3246 3248 7e846776 #644 3297 7e65308e 3248->3297 3249 7e84671f __vbaAryLock #644 __vbaAryUnlock 3249->3251 3251->3248 3251->3249 3252 7e84679c #644 3298 7e65308e 3252->3298 3254 7e8467c2 #644 3299 7e65308e 3254->3299 3256 7e8467e8 #644 3300 7e65308e 3256->3300 3258 7e84680e #644 3301 7e65308e 3258->3301 3260 7e846834 VirtualProtect 3261 7e84687f __vbaHresultCheckObj 3260->3261 3262 7e846896 3260->3262 3261->3262 3263 7e8468b2 __vbaAryLock #644 __vbaAryUnlock 3262->3263 3264 7e846903 #644 3262->3264 3263->3262 3302 7e65308e 3264->3302 3266 7e84691e #644 3303 7e65308e 3266->3303 3268 7e846933 #644 3269 7e84694f 3268->3269 3304 7e846c10 3269->3304 3271 7e846958 __vbaFreeVar 3272 7e8469dc __vbaAryDestruct 3271->3272 3272->3225 3315 7e65eea0 3273->3315 3278 7e6529fd 3277->3278 3286 7e652f91 GetPEB 3278->3286 3280 7e652a07 3281 7e652a5c NtAllocateVirtualMemory 3280->3281 3282 7e652a7f NtProtectVirtualMemory 3280->3282 3281->3282 3283 7e652a7a __vbaFreeVar 3281->3283 3282->3283 3285 7e652aaa 3282->3285 3283->3232 3284 7e652b43 NtProtectVirtualMemory 3284->3283 3285->3284 3287 7e652fa3 3286->3287 3287->3280 3289 7e84a0da 3288->3289 3290 7e84a130 __vbaFreeVar 3289->3290 3291 7e84a0df #632 __vbaVarCat __vbaVarMove __vbaFreeVarList 3289->3291 3290->3234 3291->3289 3293->3239 3294->3241 3295->3243 3296->3245 3297->3252 3298->3254 3299->3256 3300->3258 3301->3260 3302->3266 3303->3268 3312 7e847330 3304->3312 3306 7e846c4b #644 #644 3313 7e65308e 3306->3313 3308 7e846c7b #644 3314 7e6530ab 3308->3314 3310 7e846c98 #644 3311 7e846cb7 3310->3311 3311->3271 3312->3306 3313->3308 3314->3310 3316 7e65eea9 3315->3316 3465 7e65da39 3466 7e84acc0 3465->3466 3467 7e84ad3c 3466->3467 3468 7e84ad2c __vbaNew2 3466->3468 3469 7e84ad61 3467->3469 3470 7e84ad52 __vbaHresultCheckObj 3467->3470 3468->3467 3471 7e84ad85 #689 __vbaStrMove __vbaI4Str __vbaFreeStrList __vbaFreeObj 3469->3471 3472 7e84ad76 __vbaHresultCheckObj 3469->3472 3470->3469 3473 7e84ae3e __vbaObjSet 3471->3473 3474 7e84adef 3471->3474 3472->3471 3481 7e84ae5f 3473->3481 3475 7e84ae08 __vbaObjSetAddref 3474->3475 3476 7e84adf8 __vbaNew2 3474->3476 3478 7e84ae20 3475->3478 3476->3475 3479 7e84b067 __vbaFreeObj 3478->3479 3480 7e84ae2a __vbaHresultCheckObj 3478->3480 3482 7e84b070 3479->3482 3480->3479 3483 7e84ae65 __vbaHresultCheckObj 3481->3483 3484 7e84ae77 __vbaFreeObj #594 __vbaFreeVar 3481->3484 3483->3484 3485 7e84aeba 3484->3485 3486 7e84aeaa __vbaNew2 3484->3486 3487 7e84aed0 __vbaHresultCheckObj 3485->3487 3488 7e84aedf 3485->3488 3486->3485 3487->3488 3489 7e84aef4 __vbaHresultCheckObj 3488->3489 3490 7e84af03 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 3488->3490 3489->3490 3491 7e84af3b 3490->3491 3492 7e84af51 __vbaFreeStrList __vbaFreeObj 3491->3492 3493 7e84af3f __vbaHresultCheckObj 3491->3493 3492->3482 3494 7e84af8a 17 API calls 3492->3494 3493->3492 3496 7e84b027 3494->3496 3497 7e84b03c __vbaFreeStrList 3496->3497 3498 7e84b02d __vbaHresultCheckObj 3496->3498 3497->3479 3498->3497 3518 7e65da05 3519 7e84a7e0 #648 __vbaFreeVar __vbaStrCmp 3518->3519 3521 7e84a872 #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 3519->3521 3529 7e84a86a __vbaFreeStr 3519->3529 3522 7e84a8b9 __vbaFileOpen 3521->3522 3521->3529 3524 7e84a8ca #571 3522->3524 3525 7e84a970 __vbaFileClose 3524->3525 3526 7e84a8db __vbaLineInputStr 3524->3526 3525->3529 3527 7e84a8f2 __vbaNew2 3526->3527 3528 7e84a8fe 3526->3528 3527->3528 3530 7e84a954 __vbaFreeVarList 3528->3530 3531 7e84a945 __vbaHresultCheckObj 3528->3531 3530->3524 3531->3530 3838 7e653187 _CIexp 3341 7e65da46 3342 7e84b0e0 3341->3342 3343 7e84b130 __vbaNew2 3342->3343 3344 7e84b13c 3342->3344 3343->3344 3345 7e84b15d 3344->3345 3346 7e84b14e __vbaHresultCheckObj 3344->3346 3347 7e84b207 3345->3347 3348 7e84b171 __vbaObjSet 3345->3348 3346->3345 3349 7e84b184 __vbaNew2 3348->3349 3350 7e84b190 3348->3350 3349->3350 3351 7e84b1c2 __vbaStrVarVal 3350->3351 3352 7e84b1b3 __vbaHresultCheckObj 3350->3352 3353 7e84b1d7 3351->3353 3352->3351 3354 7e84b1ec __vbaFreeStr __vbaFreeObj __vbaFreeVar 3353->3354 3355 7e84b1dd __vbaHresultCheckObj 3353->3355 3354->3347 3355->3354 3632 7e65d481 3633 7e843cb0 3632->3633 3634 7e843d0e __vbaObjSetAddref 3633->3634 3635 7e843cfe __vbaNew2 3633->3635 3636 7e843d2c 3634->3636 3635->3634 3637 7e843d41 __vbaFreeObj 3636->3637 3638 7e843d32 __vbaHresultCheckObj 3636->3638 3639 7e843d5e 3637->3639 3638->3637 3839 7e65b382 3840 7e8446d0 __vbaVarVargNofree __vbaVarCopy __vbaVarTstEq 3839->3840 3842 7e8447c8 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat 3840->3842 3843 7e84486b __vbaVarTstEq 3840->3843 3844 7e845ea0 3842->3844 3845 7e844890 3843->3845 3846 7e8448e3 __vbaVarTstEq 3843->3846 3847 7e844837 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3844->3847 3853 7e8448ce __vbaVargVarMove 3845->3853 3848 7e8449d5 __vbaVarTstEq 3846->3848 3849 7e84490c 9 API calls 3846->3849 3852 7e844afc __vbaVarVargNofree __vbaVarCopy __vbaVarTstEq 3847->3852 3850 7e8449fe 13 API calls 3848->3850 3851 7e844aea 3848->3851 3854 7e845ea0 3849->3854 3855 7e845ea0 3850->3855 3851->3852 3856 7e844b50 __vbaVarTstEq 3852->3856 3879 7e844b46 3852->3879 3853->3851 3857 7e844999 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3854->3857 3858 7e844aa9 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3855->3858 3859 7e844b81 19 API calls 3856->3859 3860 7e844c98 __vbaVarTstEq 3856->3860 3857->3852 3858->3852 3861 7e845ea0 3859->3861 3862 7e844cc9 37 API calls 3860->3862 3863 7e844e8b __vbaVarTstEq 3860->3863 3866 7e844c4d __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3861->3866 3867 7e845ea0 3862->3867 3864 7e844ec2 __vbaVarTstEq 3863->3864 3863->3879 3868 7e844ef3 19 API calls 3864->3868 3869 7e84500a __vbaVarTstEq 3864->3869 3865 7e845d0e __vbaVargVarMove 3870 7e845d19 __vbaFreeVarList 3865->3870 3866->3870 3871 7e844e1c __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3867->3871 3872 7e845ea0 3868->3872 3873 7e8450e0 __vbaVarTstEq 3869->3873 3874 7e84503b 7 API calls 3869->3874 3871->3870 3876 7e844fbf __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3872->3876 3878 7e845117 __vbaVarTstEq 3873->3878 3873->3879 3877 7e845ea0 3874->3877 3876->3870 3880 7e8450ad __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3877->3880 3878->3879 3881 7e84514e __vbaVarTstEq 3878->3881 3879->3865 3880->3870 3881->3879 3882 7e845185 __vbaVarTstEq 3881->3882 3883 7e8451b6 19 API calls 3882->3883 3884 7e8452cd __vbaVarTstEq 3882->3884 3885 7e845ea0 3883->3885 3886 7e8452fe 21 API calls 3884->3886 3887 7e845428 __vbaVarTstEq 3884->3887 3888 7e845282 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3885->3888 3889 7e845ea0 3886->3889 3890 7e845654 __vbaVarTstEq 3887->3890 3891 7e845459 43 API calls 3887->3891 3888->3870 3892 7e8453d9 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3889->3892 3894 7e845685 41 API calls 3890->3894 3895 7e84586d __vbaVarTstEq 3890->3895 3893 7e845ea0 3891->3893 3892->3870 3898 7e8455d9 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3893->3898 3899 7e845ea0 3894->3899 3896 7e84589e 47 API calls 3895->3896 3897 7e845abf __vbaVarTstEq 3895->3897 3900 7e845ea0 3896->3900 3901 7e845af0 11 API calls 3897->3901 3902 7e845bbb __vbaVarTstEq 3897->3902 3898->3870 3903 7e8457f6 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3899->3903 3904 7e845a3c __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3900->3904 3905 7e845ea0 3901->3905 3902->3879 3906 7e845bf5 __vbaVarTstEq 3902->3906 3903->3870 3904->3870 3907 7e845b80 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 3905->3907 3906->3879 3908 7e845c24 __vbaVarTstEq 3906->3908 3907->3870 3908->3879 3909 7e845c53 __vbaVarTstEq 3908->3909 3909->3879 3910 7e845c7f __vbaVarTstEq 3909->3910 3910->3879 3911 7e845cab __vbaVarTstEq 3910->3911 3911->3870 3911->3879 3732 2ac4384 3733 2ac4504 GetPEB 3732->3733 3734 2ac462b 3733->3734 3777 7e652d0c 3780 7e652d22 3777->3780 3778 7e652d53 3780->3778 3781 7e652e90 3780->3781 3782 7e652ea0 3781->3782 3784 7e652ebd 3781->3784 3783 7e652f91 GetPEB 3782->3783 3782->3784 3783->3784 3784->3780 3198 2ac2d06 3199 2ac2d17 3198->3199 3217 2ac32d7 GetPEB 3199->3217 3201 2ac2d46 3202 2ac31cb 3201->3202 3203 2ac32d7 GetPEB 3201->3203 3204 2ac2d61 3203->3204 3204->3202 3205 2ac2ecd NtCreateSection 3204->3205 3205->3202 3206 2ac2f04 NtMapViewOfSection 3205->3206 3206->3202 3207 2ac2f2c 3206->3207 3208 2ac308f GetPEB 3207->3208 3212 2ac2fca CreateProcessW 3207->3212 3208->3212 3210 2ac30d5 NtGetContextThread 3211 2ac30f6 NtReadVirtualMemory 3210->3211 3210->3212 3211->3212 3213 2ac311c NtWriteVirtualMemory 3211->3213 3212->3202 3212->3210 3213->3212 3214 2ac3142 NtUnmapViewOfSection NtMapViewOfSection 3213->3214 3214->3212 3215 2ac3176 NtSetContextThread 3214->3215 3215->3212 3216 2ac31a7 NtResumeThread 3215->3216 3216->3202 3216->3212 3218 2ac32ec 3217->3218 3218->3201 3640 7e65d48e 3641 7e843d80 3640->3641 3642 7e843e08 3641->3642 3643 7e843df8 __vbaNew2 3641->3643 3644 7e843e2d 3642->3644 3645 7e843e1e __vbaHresultCheckObj 3642->3645 3643->3642 3646 7e843e51 __vbaStrCat __vbaStrMove 3644->3646 3647 7e843e42 __vbaHresultCheckObj 3644->3647 3645->3644 3648 7e843e74 3646->3648 3647->3646 3649 7e843e8d 3648->3649 3650 7e843e7a __vbaHresultCheckObj 3648->3650 3651 7e843e93 __vbaFreeStrList __vbaFreeObj 3649->3651 3650->3651 3652 7e843eb8 __vbaObjSet 3651->3652 3653 7e843ee2 3652->3653 3654 7e843ed2 __vbaNew2 3652->3654 3655 7e843f03 3653->3655 3656 7e843ef8 __vbaHresultCheckObj 3653->3656 3654->3653 3657 7e843f29 3655->3657 3658 7e843f1b __vbaHresultCheckObj 3655->3658 3656->3655 3659 7e843f42 3657->3659 3660 7e843f32 __vbaNew2 3657->3660 3658->3657 3661 7e843f63 3659->3661 3662 7e843f58 __vbaHresultCheckObj 3659->3662 3660->3659 3663 7e843f89 3661->3663 3664 7e843f7b __vbaHresultCheckObj 3661->3664 3662->3661 3665 7e843fa2 3663->3665 3666 7e843f92 __vbaNew2 3663->3666 3664->3663 3667 7e843fc3 3665->3667 3668 7e843fb8 __vbaHresultCheckObj 3665->3668 3666->3665 3669 7e843fe9 16 API calls 3667->3669 3670 7e843fdb __vbaHresultCheckObj 3667->3670 3668->3667 3671 7e844080 3669->3671 3670->3669 3672 7e844086 __vbaHresultCheckObj 3671->3672 3673 7e844099 3671->3673 3674 7e84409f __vbaFreeStrList __vbaFreeObjList 3672->3674 3673->3674 3675 7e8440ee __vbaObjSet 3674->3675 3676 7e844114 3675->3676 3677 7e844104 __vbaNew2 3675->3677 3678 7e844135 3676->3678 3679 7e84412a __vbaHresultCheckObj 3676->3679 3677->3676 3680 7e844155 3678->3680 3681 7e84414a __vbaHresultCheckObj 3678->3681 3679->3678 3682 7e844165 __vbaHresultCheckObj 3680->3682 3683 7e844170 __vbaFreeStr __vbaFreeObjList 3680->3683 3681->3680 3682->3683 3684 7e8441de 3683->3684 3808 2ac671f GetPEB 3950 2ac455f 3951 2ac5306 3950->3951 3952 2ac5402 3951->3952 3953 2ac65b4 GetPEB 3951->3953 3953->3952 3589 7e65da12 3590 7e84a9f0 3589->3590 3591 7e84aa5a 3590->3591 3592 7e84aa4a __vbaNew2 3590->3592 3593 7e84aa70 __vbaHresultCheckObj 3591->3593 3594 7e84aa83 3591->3594 3592->3591 3593->3594 3595 7e84aa9e __vbaHresultCheckObj 3594->3595 3596 7e84aaa9 __vbaObjSet 3594->3596 3595->3596 3598 7e84aacc 3596->3598 3599 7e84aae0 __vbaStrI2 __vbaStrMove #690 __vbaFreeStrList __vbaFreeObjList 3598->3599 3600 7e84aad2 __vbaHresultCheckObj 3598->3600 3601 7e84ab5f 3599->3601 3600->3599 3954 7e65319f _CItan 3607 7e6530db 3608 7e6530e0 3607->3608 3609 7e6530ec 3607->3609 3608->3609 3610 7e653129 __vbaFPException 3608->3610

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 59 2ac069b-2ac235a call 2ac03eb 63 2ac2ce8-2ac2d05 59->63 64 2ac2360-2ac2371 59->64 66 2ac2d5c-2ac2d68 call 2ac32d7 63->66 67 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 63->67 64->63 72 2ac2d6e-2ac2e5b call 2ac3228 * 12 66->72 73 2ac31cb-2ac31d1 66->73 67->73 77 2ac2d52-2ac2d57 67->77 72->73 101 2ac2e61-2ac2e64 72->101 77->66 101->73 102 2ac2e6a-2ac2e6d 101->102 102->73 103 2ac2e73-2ac2e76 102->103 103->73 104 2ac2e7c-2ac2e7f 103->104 104->73 105 2ac2e85-2ac2e88 104->105 105->73 106 2ac2e8e-2ac2e91 105->106 106->73 107 2ac2e97-2ac2e9a 106->107 107->73 108 2ac2ea0-2ac2ea3 107->108 108->73 109 2ac2ea9-2ac2eac 108->109 109->73 110 2ac2eb2-2ac2eb4 109->110 110->73 111 2ac2eba-2ac2ec8 110->111 112 2ac2ecd-2ac2efe NtCreateSection 111->112 113 2ac2eca 111->113 112->73 114 2ac2f04-2ac2f26 NtMapViewOfSection 112->114 113->112 114->73 115 2ac2f2c-2ac2f62 call 2ac32b8 114->115 118 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 115->118 119 2ac2f64-2ac2f6a 115->119 130 2ac308f-2ac309b GetPEB 118->130 131 2ac2fca-2ac3041 118->131 120 2ac2f6f-2ac2f73 119->120 122 2ac2f8b-2ac2f98 120->122 123 2ac2f75-2ac2f88 call 2ac32b8 120->123 122->118 126 2ac2f6c 122->126 123->122 126->120 132 2ac309e-2ac30a5 130->132 135 2ac3043-2ac3053 131->135 134 2ac30b2-2ac30cf CreateProcessW 132->134 134->73 136 2ac30d5-2ac30f0 NtGetContextThread 134->136 135->135 137 2ac3055-2ac3058 135->137 138 2ac30f6-2ac3116 NtReadVirtualMemory 136->138 139 2ac31b7-2ac31ba 136->139 140 2ac3066-2ac306a 137->140 138->139 143 2ac311c-2ac3140 NtWriteVirtualMemory 138->143 144 2ac31bc-2ac31bd 139->144 145 2ac31c3-2ac31c6 139->145 141 2ac306c 140->141 142 2ac305a-2ac3065 140->142 146 2ac3079-2ac307e 141->146 142->140 143->139 147 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 143->147 144->145 145->134 148 2ac306e-2ac3078 146->148 149 2ac3080-2ac308d 146->149 150 2ac31b4 147->150 151 2ac3176-2ac31a5 NtSetContextThread 147->151 148->146 149->132 150->139 151->150 152 2ac31a7-2ac31b2 NtResumeThread 151->152 152->73 152->150
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: e52940c02b44e104ee3a3b25ea14b03d2f0e68b29b73a9f03bf7fd1b27a11845
                                            • Instruction ID: 15269b239c513ac5466fc419b204c132eb2b19b7ab3c4f9e9776f46b7798424c
                                            • Opcode Fuzzy Hash: e52940c02b44e104ee3a3b25ea14b03d2f0e68b29b73a9f03bf7fd1b27a11845
                                            • Instruction Fuzzy Hash: 02E147B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE515A7201DB309A85CF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 153 2ac02f0-2ac0749 call 2ac03eb 157 2ac074f-2ac276d 153->157 158 2ac2ce8-2ac2d05 153->158 157->158 161 2ac2d5c-2ac2d68 call 2ac32d7 158->161 162 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 158->162 167 2ac2d6e-2ac2e5b call 2ac3228 * 12 161->167 168 2ac31cb-2ac31d1 161->168 162->168 172 2ac2d52-2ac2d57 162->172 167->168 196 2ac2e61-2ac2e64 167->196 172->161 196->168 197 2ac2e6a-2ac2e6d 196->197 197->168 198 2ac2e73-2ac2e76 197->198 198->168 199 2ac2e7c-2ac2e7f 198->199 199->168 200 2ac2e85-2ac2e88 199->200 200->168 201 2ac2e8e-2ac2e91 200->201 201->168 202 2ac2e97-2ac2e9a 201->202 202->168 203 2ac2ea0-2ac2ea3 202->203 203->168 204 2ac2ea9-2ac2eac 203->204 204->168 205 2ac2eb2-2ac2eb4 204->205 205->168 206 2ac2eba-2ac2ec8 205->206 207 2ac2ecd-2ac2efe NtCreateSection 206->207 208 2ac2eca 206->208 207->168 209 2ac2f04-2ac2f26 NtMapViewOfSection 207->209 208->207 209->168 210 2ac2f2c-2ac2f62 call 2ac32b8 209->210 213 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 210->213 214 2ac2f64-2ac2f6a 210->214 225 2ac308f-2ac309b GetPEB 213->225 226 2ac2fca-2ac3041 213->226 215 2ac2f6f-2ac2f73 214->215 217 2ac2f8b-2ac2f98 215->217 218 2ac2f75-2ac2f88 call 2ac32b8 215->218 217->213 221 2ac2f6c 217->221 218->217 221->215 227 2ac309e-2ac30a5 225->227 230 2ac3043-2ac3053 226->230 229 2ac30b2-2ac30cf CreateProcessW 227->229 229->168 231 2ac30d5-2ac30f0 NtGetContextThread 229->231 230->230 232 2ac3055-2ac3058 230->232 233 2ac30f6-2ac3116 NtReadVirtualMemory 231->233 234 2ac31b7-2ac31ba 231->234 235 2ac3066-2ac306a 232->235 233->234 238 2ac311c-2ac3140 NtWriteVirtualMemory 233->238 239 2ac31bc-2ac31bd 234->239 240 2ac31c3-2ac31c6 234->240 236 2ac306c 235->236 237 2ac305a-2ac3065 235->237 241 2ac3079-2ac307e 236->241 237->235 238->234 242 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 238->242 239->240 240->229 243 2ac306e-2ac3078 241->243 244 2ac3080-2ac308d 241->244 245 2ac31b4 242->245 246 2ac3176-2ac31a5 NtSetContextThread 242->246 243->241 244->227 245->234 246->245 247 2ac31a7-2ac31b2 NtResumeThread 246->247 247->168 247->245
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: a36373ad2e5310e18fc03da1c3e73d632cf9b5787d89b21943ab7ba24ecfd4be
                                            • Instruction ID: 6b986a50d9c8ebecb4e1940ed2ba234da231cd91ebcfba9475de42d098a17355
                                            • Opcode Fuzzy Hash: a36373ad2e5310e18fc03da1c3e73d632cf9b5787d89b21943ab7ba24ecfd4be
                                            • Instruction Fuzzy Hash: 83E137B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE514A7201DB349A95CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 248 2ac2c91-2ac2c92 249 2ac2cea-2ac2d05 248->249 250 2ac2c94-2ac2cb7 call 2ac100e 248->250 251 2ac2d5c-2ac2d68 call 2ac32d7 249->251 252 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 249->252 250->249 260 2ac2d6e-2ac2e5b call 2ac3228 * 12 251->260 261 2ac31cb-2ac31d1 251->261 252->261 265 2ac2d52-2ac2d57 252->265 260->261 289 2ac2e61-2ac2e64 260->289 265->251 289->261 290 2ac2e6a-2ac2e6d 289->290 290->261 291 2ac2e73-2ac2e76 290->291 291->261 292 2ac2e7c-2ac2e7f 291->292 292->261 293 2ac2e85-2ac2e88 292->293 293->261 294 2ac2e8e-2ac2e91 293->294 294->261 295 2ac2e97-2ac2e9a 294->295 295->261 296 2ac2ea0-2ac2ea3 295->296 296->261 297 2ac2ea9-2ac2eac 296->297 297->261 298 2ac2eb2-2ac2eb4 297->298 298->261 299 2ac2eba-2ac2ec8 298->299 300 2ac2ecd-2ac2efe NtCreateSection 299->300 301 2ac2eca 299->301 300->261 302 2ac2f04-2ac2f26 NtMapViewOfSection 300->302 301->300 302->261 303 2ac2f2c-2ac2f62 call 2ac32b8 302->303 306 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 303->306 307 2ac2f64-2ac2f6a 303->307 318 2ac308f-2ac309b GetPEB 306->318 319 2ac2fca-2ac3041 306->319 308 2ac2f6f-2ac2f73 307->308 310 2ac2f8b-2ac2f98 308->310 311 2ac2f75-2ac2f88 call 2ac32b8 308->311 310->306 314 2ac2f6c 310->314 311->310 314->308 320 2ac309e-2ac30a5 318->320 323 2ac3043-2ac3053 319->323 322 2ac30b2-2ac30cf CreateProcessW 320->322 322->261 324 2ac30d5-2ac30f0 NtGetContextThread 322->324 323->323 325 2ac3055-2ac3058 323->325 326 2ac30f6-2ac3116 NtReadVirtualMemory 324->326 327 2ac31b7-2ac31ba 324->327 328 2ac3066-2ac306a 325->328 326->327 331 2ac311c-2ac3140 NtWriteVirtualMemory 326->331 332 2ac31bc-2ac31bd 327->332 333 2ac31c3-2ac31c6 327->333 329 2ac306c 328->329 330 2ac305a-2ac3065 328->330 334 2ac3079-2ac307e 329->334 330->328 331->327 335 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 331->335 332->333 333->322 336 2ac306e-2ac3078 334->336 337 2ac3080-2ac308d 334->337 338 2ac31b4 335->338 339 2ac3176-2ac31a5 NtSetContextThread 335->339 336->334 337->320 338->327 339->338 340 2ac31a7-2ac31b2 NtResumeThread 339->340 340->261 340->338
                                            APIs
                                            • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 02AC2EF2
                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02AC2F1F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: Section$CreateView
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 1585966358-1087957892
                                            • Opcode ID: 1fe3776fe771f3dfdabe874908b5a0c1143ef0ab3795bc9f32fb43960838373d
                                            • Instruction ID: 4d882d91e1576a3918df723c47313f41f309193b4863c385095a6f3f3bde143f
                                            • Opcode Fuzzy Hash: 1fe3776fe771f3dfdabe874908b5a0c1143ef0ab3795bc9f32fb43960838373d
                                            • Instruction Fuzzy Hash: 88E147B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE514A7201DB349A95CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 436 2ac06ff-2ac2be7 438 2ac2bed-2ac2bf4 436->438 439 2ac2ce8-2ac2d05 436->439 438->439 441 2ac2d5c-2ac2d68 call 2ac32d7 439->441 442 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 439->442 447 2ac2d6e-2ac2e5b call 2ac3228 * 12 441->447 448 2ac31cb-2ac31d1 441->448 442->448 452 2ac2d52-2ac2d57 442->452 447->448 476 2ac2e61-2ac2e64 447->476 452->441 476->448 477 2ac2e6a-2ac2e6d 476->477 477->448 478 2ac2e73-2ac2e76 477->478 478->448 479 2ac2e7c-2ac2e7f 478->479 479->448 480 2ac2e85-2ac2e88 479->480 480->448 481 2ac2e8e-2ac2e91 480->481 481->448 482 2ac2e97-2ac2e9a 481->482 482->448 483 2ac2ea0-2ac2ea3 482->483 483->448 484 2ac2ea9-2ac2eac 483->484 484->448 485 2ac2eb2-2ac2eb4 484->485 485->448 486 2ac2eba-2ac2ec8 485->486 487 2ac2ecd-2ac2efe NtCreateSection 486->487 488 2ac2eca 486->488 487->448 489 2ac2f04-2ac2f26 NtMapViewOfSection 487->489 488->487 489->448 490 2ac2f2c-2ac2f62 call 2ac32b8 489->490 493 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 490->493 494 2ac2f64-2ac2f6a 490->494 505 2ac308f-2ac309b GetPEB 493->505 506 2ac2fca-2ac3041 493->506 495 2ac2f6f-2ac2f73 494->495 497 2ac2f8b-2ac2f98 495->497 498 2ac2f75-2ac2f88 call 2ac32b8 495->498 497->493 501 2ac2f6c 497->501 498->497 501->495 507 2ac309e-2ac30a5 505->507 510 2ac3043-2ac3053 506->510 509 2ac30b2-2ac30cf CreateProcessW 507->509 509->448 511 2ac30d5-2ac30f0 NtGetContextThread 509->511 510->510 512 2ac3055-2ac3058 510->512 513 2ac30f6-2ac3116 NtReadVirtualMemory 511->513 514 2ac31b7-2ac31ba 511->514 515 2ac3066-2ac306a 512->515 513->514 518 2ac311c-2ac3140 NtWriteVirtualMemory 513->518 519 2ac31bc-2ac31bd 514->519 520 2ac31c3-2ac31c6 514->520 516 2ac306c 515->516 517 2ac305a-2ac3065 515->517 521 2ac3079-2ac307e 516->521 517->515 518->514 522 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 518->522 519->520 520->509 523 2ac306e-2ac3078 521->523 524 2ac3080-2ac308d 521->524 525 2ac31b4 522->525 526 2ac3176-2ac31a5 NtSetContextThread 522->526 523->521 524->507 525->514 526->525 527 2ac31a7-2ac31b2 NtResumeThread 526->527 527->448 527->525
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: 8228d97ba5e75433b2c31e1f0904fc7046173a7a3335c5e39ed262d6badd8588
                                            • Instruction ID: 7615abf332e94e90d81dea1ef41661e441cd84c3c0b0a1773ba0ee6f11ecb238
                                            • Opcode Fuzzy Hash: 8228d97ba5e75433b2c31e1f0904fc7046173a7a3335c5e39ed262d6badd8588
                                            • Instruction Fuzzy Hash: DCE148B2D00259AFDF11DFA4DD80AEDBBB9FF04314F2484AAE515AB201DB309A95CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 341 2ac01a0-2ac0aa9 345 2ac0aaf-2ac2b8d 341->345 346 2ac2ce8-2ac2d05 341->346 345->346 349 2ac2d5c-2ac2d68 call 2ac32d7 346->349 350 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 346->350 355 2ac2d6e-2ac2e5b call 2ac3228 * 12 349->355 356 2ac31cb-2ac31d1 349->356 350->356 360 2ac2d52-2ac2d57 350->360 355->356 384 2ac2e61-2ac2e64 355->384 360->349 384->356 385 2ac2e6a-2ac2e6d 384->385 385->356 386 2ac2e73-2ac2e76 385->386 386->356 387 2ac2e7c-2ac2e7f 386->387 387->356 388 2ac2e85-2ac2e88 387->388 388->356 389 2ac2e8e-2ac2e91 388->389 389->356 390 2ac2e97-2ac2e9a 389->390 390->356 391 2ac2ea0-2ac2ea3 390->391 391->356 392 2ac2ea9-2ac2eac 391->392 392->356 393 2ac2eb2-2ac2eb4 392->393 393->356 394 2ac2eba-2ac2ec8 393->394 395 2ac2ecd-2ac2efe NtCreateSection 394->395 396 2ac2eca 394->396 395->356 397 2ac2f04-2ac2f26 NtMapViewOfSection 395->397 396->395 397->356 398 2ac2f2c-2ac2f62 call 2ac32b8 397->398 401 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 398->401 402 2ac2f64-2ac2f6a 398->402 413 2ac308f-2ac309b GetPEB 401->413 414 2ac2fca-2ac3041 401->414 403 2ac2f6f-2ac2f73 402->403 405 2ac2f8b-2ac2f98 403->405 406 2ac2f75-2ac2f88 call 2ac32b8 403->406 405->401 409 2ac2f6c 405->409 406->405 409->403 415 2ac309e-2ac30a5 413->415 418 2ac3043-2ac3053 414->418 417 2ac30b2-2ac30cf CreateProcessW 415->417 417->356 419 2ac30d5-2ac30f0 NtGetContextThread 417->419 418->418 420 2ac3055-2ac3058 418->420 421 2ac30f6-2ac3116 NtReadVirtualMemory 419->421 422 2ac31b7-2ac31ba 419->422 423 2ac3066-2ac306a 420->423 421->422 426 2ac311c-2ac3140 NtWriteVirtualMemory 421->426 427 2ac31bc-2ac31bd 422->427 428 2ac31c3-2ac31c6 422->428 424 2ac306c 423->424 425 2ac305a-2ac3065 423->425 429 2ac3079-2ac307e 424->429 425->423 426->422 430 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 426->430 427->428 428->417 431 2ac306e-2ac3078 429->431 432 2ac3080-2ac308d 429->432 433 2ac31b4 430->433 434 2ac3176-2ac31a5 NtSetContextThread 430->434 431->429 432->415 433->422 434->433 435 2ac31a7-2ac31b2 NtResumeThread 434->435 435->356 435->433
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: c5a7bf3f7b015d140592472eafe8b17cbc776e3716947a90bcf411af2f49dca9
                                            • Instruction ID: 2a0c77f29144553a359d14e9d4252f87d7aee3725199f67856dfddaad18d9569
                                            • Opcode Fuzzy Hash: c5a7bf3f7b015d140592472eafe8b17cbc776e3716947a90bcf411af2f49dca9
                                            • Instruction Fuzzy Hash: DAE138B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE515A7201DB349A95CF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 528 2ac06bb-2ac29e5 531 2ac2ce8-2ac2d05 528->531 532 2ac29eb-2ac2b68 528->532 535 2ac2d5c-2ac2d68 call 2ac32d7 531->535 536 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 531->536 541 2ac2d6e-2ac2e5b call 2ac3228 * 12 535->541 542 2ac31cb-2ac31d1 535->542 536->542 546 2ac2d52-2ac2d57 536->546 541->542 570 2ac2e61-2ac2e64 541->570 546->535 570->542 571 2ac2e6a-2ac2e6d 570->571 571->542 572 2ac2e73-2ac2e76 571->572 572->542 573 2ac2e7c-2ac2e7f 572->573 573->542 574 2ac2e85-2ac2e88 573->574 574->542 575 2ac2e8e-2ac2e91 574->575 575->542 576 2ac2e97-2ac2e9a 575->576 576->542 577 2ac2ea0-2ac2ea3 576->577 577->542 578 2ac2ea9-2ac2eac 577->578 578->542 579 2ac2eb2-2ac2eb4 578->579 579->542 580 2ac2eba-2ac2ec8 579->580 581 2ac2ecd-2ac2efe NtCreateSection 580->581 582 2ac2eca 580->582 581->542 583 2ac2f04-2ac2f26 NtMapViewOfSection 581->583 582->581 583->542 584 2ac2f2c-2ac2f62 call 2ac32b8 583->584 587 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 584->587 588 2ac2f64-2ac2f6a 584->588 599 2ac308f-2ac309b GetPEB 587->599 600 2ac2fca-2ac3041 587->600 589 2ac2f6f-2ac2f73 588->589 591 2ac2f8b-2ac2f98 589->591 592 2ac2f75-2ac2f88 call 2ac32b8 589->592 591->587 595 2ac2f6c 591->595 592->591 595->589 601 2ac309e-2ac30a5 599->601 604 2ac3043-2ac3053 600->604 603 2ac30b2-2ac30cf CreateProcessW 601->603 603->542 605 2ac30d5-2ac30f0 NtGetContextThread 603->605 604->604 606 2ac3055-2ac3058 604->606 607 2ac30f6-2ac3116 NtReadVirtualMemory 605->607 608 2ac31b7-2ac31ba 605->608 609 2ac3066-2ac306a 606->609 607->608 612 2ac311c-2ac3140 NtWriteVirtualMemory 607->612 613 2ac31bc-2ac31bd 608->613 614 2ac31c3-2ac31c6 608->614 610 2ac306c 609->610 611 2ac305a-2ac3065 609->611 615 2ac3079-2ac307e 610->615 611->609 612->608 616 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 612->616 613->614 614->603 617 2ac306e-2ac3078 615->617 618 2ac3080-2ac308d 615->618 619 2ac31b4 616->619 620 2ac3176-2ac31a5 NtSetContextThread 616->620 617->615 618->601 619->608 620->619 621 2ac31a7-2ac31b2 NtResumeThread 620->621 621->542 621->619
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: 134c417e4282c6295a72bee0faa0a432af82352440953f3df23f277074e276eb
                                            • Instruction ID: 593aab1a3b8cd65571a60a26432a8c4f7516952c3355881bd3b7c75021f5cbb4
                                            • Opcode Fuzzy Hash: 134c417e4282c6295a72bee0faa0a432af82352440953f3df23f277074e276eb
                                            • Instruction Fuzzy Hash: E9E139B2D00259AFDF11DFA4DD80AEDBBB5FF08314F2484AAE515A7201DB309A95CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 622 2ac0360-2ac0af9 625 2ac0aff-2ac0b0c 622->625 626 2ac2ce8-2ac2d05 622->626 625->626 628 2ac2d5c-2ac2d68 call 2ac32d7 626->628 629 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 626->629 634 2ac2d6e-2ac2e5b call 2ac3228 * 12 628->634 635 2ac31cb-2ac31d1 628->635 629->635 639 2ac2d52-2ac2d57 629->639 634->635 663 2ac2e61-2ac2e64 634->663 639->628 663->635 664 2ac2e6a-2ac2e6d 663->664 664->635 665 2ac2e73-2ac2e76 664->665 665->635 666 2ac2e7c-2ac2e7f 665->666 666->635 667 2ac2e85-2ac2e88 666->667 667->635 668 2ac2e8e-2ac2e91 667->668 668->635 669 2ac2e97-2ac2e9a 668->669 669->635 670 2ac2ea0-2ac2ea3 669->670 670->635 671 2ac2ea9-2ac2eac 670->671 671->635 672 2ac2eb2-2ac2eb4 671->672 672->635 673 2ac2eba-2ac2ec8 672->673 674 2ac2ecd-2ac2efe NtCreateSection 673->674 675 2ac2eca 673->675 674->635 676 2ac2f04-2ac2f26 NtMapViewOfSection 674->676 675->674 676->635 677 2ac2f2c-2ac2f62 call 2ac32b8 676->677 680 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 677->680 681 2ac2f64-2ac2f6a 677->681 692 2ac308f-2ac309b GetPEB 680->692 693 2ac2fca-2ac3041 680->693 682 2ac2f6f-2ac2f73 681->682 684 2ac2f8b-2ac2f98 682->684 685 2ac2f75-2ac2f88 call 2ac32b8 682->685 684->680 688 2ac2f6c 684->688 685->684 688->682 694 2ac309e-2ac30a5 692->694 697 2ac3043-2ac3053 693->697 696 2ac30b2-2ac30cf CreateProcessW 694->696 696->635 698 2ac30d5-2ac30f0 NtGetContextThread 696->698 697->697 699 2ac3055-2ac3058 697->699 700 2ac30f6-2ac3116 NtReadVirtualMemory 698->700 701 2ac31b7-2ac31ba 698->701 702 2ac3066-2ac306a 699->702 700->701 705 2ac311c-2ac3140 NtWriteVirtualMemory 700->705 706 2ac31bc-2ac31bd 701->706 707 2ac31c3-2ac31c6 701->707 703 2ac306c 702->703 704 2ac305a-2ac3065 702->704 708 2ac3079-2ac307e 703->708 704->702 705->701 709 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 705->709 706->707 707->696 710 2ac306e-2ac3078 708->710 711 2ac3080-2ac308d 708->711 712 2ac31b4 709->712 713 2ac3176-2ac31a5 NtSetContextThread 709->713 710->708 711->694 712->701 713->712 714 2ac31a7-2ac31b2 NtResumeThread 713->714 714->635 714->712
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: bc4cce3e52d33c5d4b164733d193f2c752b3e2d45a9d1745f7fc2090e33f6bbf
                                            • Instruction ID: 96add9bd975cf97a801f522d42d327e4b3dcfdb8474c06c964b0c3405b81d83c
                                            • Opcode Fuzzy Hash: bc4cce3e52d33c5d4b164733d193f2c752b3e2d45a9d1745f7fc2090e33f6bbf
                                            • Instruction Fuzzy Hash: 07E137B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE515A7201DB309A95CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 808 2ac1ce8-2ac2d05 811 2ac2d5c-2ac2d68 call 2ac32d7 808->811 812 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 808->812 817 2ac2d6e-2ac2e5b call 2ac3228 * 12 811->817 818 2ac31cb-2ac31d1 811->818 812->818 822 2ac2d52-2ac2d57 812->822 817->818 846 2ac2e61-2ac2e64 817->846 822->811 846->818 847 2ac2e6a-2ac2e6d 846->847 847->818 848 2ac2e73-2ac2e76 847->848 848->818 849 2ac2e7c-2ac2e7f 848->849 849->818 850 2ac2e85-2ac2e88 849->850 850->818 851 2ac2e8e-2ac2e91 850->851 851->818 852 2ac2e97-2ac2e9a 851->852 852->818 853 2ac2ea0-2ac2ea3 852->853 853->818 854 2ac2ea9-2ac2eac 853->854 854->818 855 2ac2eb2-2ac2eb4 854->855 855->818 856 2ac2eba-2ac2ec8 855->856 857 2ac2ecd-2ac2efe NtCreateSection 856->857 858 2ac2eca 856->858 857->818 859 2ac2f04-2ac2f26 NtMapViewOfSection 857->859 858->857 859->818 860 2ac2f2c-2ac2f62 call 2ac32b8 859->860 863 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 860->863 864 2ac2f64-2ac2f6a 860->864 875 2ac308f-2ac309b GetPEB 863->875 876 2ac2fca-2ac3041 863->876 865 2ac2f6f-2ac2f73 864->865 867 2ac2f8b-2ac2f98 865->867 868 2ac2f75-2ac2f88 call 2ac32b8 865->868 867->863 871 2ac2f6c 867->871 868->867 871->865 877 2ac309e-2ac30a5 875->877 880 2ac3043-2ac3053 876->880 879 2ac30b2-2ac30cf CreateProcessW 877->879 879->818 881 2ac30d5-2ac30f0 NtGetContextThread 879->881 880->880 882 2ac3055-2ac3058 880->882 883 2ac30f6-2ac3116 NtReadVirtualMemory 881->883 884 2ac31b7-2ac31ba 881->884 885 2ac3066-2ac306a 882->885 883->884 888 2ac311c-2ac3140 NtWriteVirtualMemory 883->888 889 2ac31bc-2ac31bd 884->889 890 2ac31c3-2ac31c6 884->890 886 2ac306c 885->886 887 2ac305a-2ac3065 885->887 891 2ac3079-2ac307e 886->891 887->885 888->884 892 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 888->892 889->890 890->879 893 2ac306e-2ac3078 891->893 894 2ac3080-2ac308d 891->894 895 2ac31b4 892->895 896 2ac3176-2ac31a5 NtSetContextThread 892->896 893->891 894->877 895->884 896->895 897 2ac31a7-2ac31b2 NtResumeThread 896->897 897->818 897->895
                                            APIs
                                            • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 02AC2EF2
                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02AC2F1F
                                            • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 02AC30CA
                                            • NtGetContextThread.NTDLL(?,?), ref: 02AC30E9
                                            • NtReadVirtualMemory.NTDLL(?,?,?,000001D8,?), ref: 02AC310F
                                            • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 02AC3139
                                            • NtUnmapViewOfSection.NTDLL(?,?), ref: 02AC3154
                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02AC316D
                                            • NtSetContextThread.NTDLL(?,00010003), ref: 02AC319E
                                            • NtResumeThread.NTDLL(?,00000000), ref: 02AC31AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: Section$ThreadView$ContextCreateMemoryVirtual$ProcessReadResumeUnmapWrite
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 1951729442-1087957892
                                            • Opcode ID: a7876de07d5ad348493e458939affc936dcb46249d2fb4a7df1c66bba81792a9
                                            • Instruction ID: f3ada2b134616649dc47c7f069b6aab8d9a11682a7e9e128343817a2f488f2be
                                            • Opcode Fuzzy Hash: a7876de07d5ad348493e458939affc936dcb46249d2fb4a7df1c66bba81792a9
                                            • Instruction Fuzzy Hash: E1E148B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE515A7201DB309A95CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 715 2ac024e-2ac10de 717 2ac2ce8-2ac2d05 715->717 718 2ac10e4-2ac1db1 715->718 721 2ac2d5c-2ac2d68 call 2ac32d7 717->721 722 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 717->722 718->717 727 2ac2d6e-2ac2e5b call 2ac3228 * 12 721->727 728 2ac31cb-2ac31d1 721->728 722->728 732 2ac2d52-2ac2d57 722->732 727->728 756 2ac2e61-2ac2e64 727->756 732->721 756->728 757 2ac2e6a-2ac2e6d 756->757 757->728 758 2ac2e73-2ac2e76 757->758 758->728 759 2ac2e7c-2ac2e7f 758->759 759->728 760 2ac2e85-2ac2e88 759->760 760->728 761 2ac2e8e-2ac2e91 760->761 761->728 762 2ac2e97-2ac2e9a 761->762 762->728 763 2ac2ea0-2ac2ea3 762->763 763->728 764 2ac2ea9-2ac2eac 763->764 764->728 765 2ac2eb2-2ac2eb4 764->765 765->728 766 2ac2eba-2ac2ec8 765->766 767 2ac2ecd-2ac2efe NtCreateSection 766->767 768 2ac2eca 766->768 767->728 769 2ac2f04-2ac2f26 NtMapViewOfSection 767->769 768->767 769->728 770 2ac2f2c-2ac2f62 call 2ac32b8 769->770 773 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 770->773 774 2ac2f64-2ac2f6a 770->774 785 2ac308f-2ac309b GetPEB 773->785 786 2ac2fca-2ac3041 773->786 775 2ac2f6f-2ac2f73 774->775 777 2ac2f8b-2ac2f98 775->777 778 2ac2f75-2ac2f88 call 2ac32b8 775->778 777->773 781 2ac2f6c 777->781 778->777 781->775 787 2ac309e-2ac30a5 785->787 790 2ac3043-2ac3053 786->790 789 2ac30b2-2ac30cf CreateProcessW 787->789 789->728 791 2ac30d5-2ac30f0 NtGetContextThread 789->791 790->790 792 2ac3055-2ac3058 790->792 793 2ac30f6-2ac3116 NtReadVirtualMemory 791->793 794 2ac31b7-2ac31ba 791->794 795 2ac3066-2ac306a 792->795 793->794 798 2ac311c-2ac3140 NtWriteVirtualMemory 793->798 799 2ac31bc-2ac31bd 794->799 800 2ac31c3-2ac31c6 794->800 796 2ac306c 795->796 797 2ac305a-2ac3065 795->797 801 2ac3079-2ac307e 796->801 797->795 798->794 802 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 798->802 799->800 800->789 803 2ac306e-2ac3078 801->803 804 2ac3080-2ac308d 801->804 805 2ac31b4 802->805 806 2ac3176-2ac31a5 NtSetContextThread 802->806 803->801 804->787 805->794 806->805 807 2ac31a7-2ac31b2 NtResumeThread 806->807 807->728 807->805
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: 2fc2077c7ad7907092174ded618c216a14186769ef1c28b9f96eb7ef214daea0
                                            • Instruction ID: 3da1ec46b4435549cc88a0b2fcfdc31bb5bad417c8f16eb594e3a1aca396c11f
                                            • Opcode Fuzzy Hash: 2fc2077c7ad7907092174ded618c216a14186769ef1c28b9f96eb7ef214daea0
                                            • Instruction Fuzzy Hash: 45E138B2D00259AFDF11DFA4DD80AEDBBB9FF04314F2484AAE515A7201DB309A95CF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 898 2ac06d9-2ac27a9 900 2ac27af-2ac29ab 898->900 901 2ac2ce8-2ac2d05 898->901 900->901 904 2ac2d5c-2ac2d68 call 2ac32d7 901->904 905 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 901->905 910 2ac2d6e-2ac2e5b call 2ac3228 * 12 904->910 911 2ac31cb-2ac31d1 904->911 905->911 915 2ac2d52-2ac2d57 905->915 910->911 939 2ac2e61-2ac2e64 910->939 915->904 939->911 940 2ac2e6a-2ac2e6d 939->940 940->911 941 2ac2e73-2ac2e76 940->941 941->911 942 2ac2e7c-2ac2e7f 941->942 942->911 943 2ac2e85-2ac2e88 942->943 943->911 944 2ac2e8e-2ac2e91 943->944 944->911 945 2ac2e97-2ac2e9a 944->945 945->911 946 2ac2ea0-2ac2ea3 945->946 946->911 947 2ac2ea9-2ac2eac 946->947 947->911 948 2ac2eb2-2ac2eb4 947->948 948->911 949 2ac2eba-2ac2ec8 948->949 950 2ac2ecd-2ac2efe NtCreateSection 949->950 951 2ac2eca 949->951 950->911 952 2ac2f04-2ac2f26 NtMapViewOfSection 950->952 951->950 952->911 953 2ac2f2c-2ac2f62 call 2ac32b8 952->953 956 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 953->956 957 2ac2f64-2ac2f6a 953->957 968 2ac308f-2ac309b GetPEB 956->968 969 2ac2fca-2ac3041 956->969 958 2ac2f6f-2ac2f73 957->958 960 2ac2f8b-2ac2f98 958->960 961 2ac2f75-2ac2f88 call 2ac32b8 958->961 960->956 964 2ac2f6c 960->964 961->960 964->958 970 2ac309e-2ac30a5 968->970 973 2ac3043-2ac3053 969->973 972 2ac30b2-2ac30cf CreateProcessW 970->972 972->911 974 2ac30d5-2ac30f0 NtGetContextThread 972->974 973->973 975 2ac3055-2ac3058 973->975 976 2ac30f6-2ac3116 NtReadVirtualMemory 974->976 977 2ac31b7-2ac31ba 974->977 978 2ac3066-2ac306a 975->978 976->977 981 2ac311c-2ac3140 NtWriteVirtualMemory 976->981 982 2ac31bc-2ac31bd 977->982 983 2ac31c3-2ac31c6 977->983 979 2ac306c 978->979 980 2ac305a-2ac3065 978->980 984 2ac3079-2ac307e 979->984 980->978 981->977 985 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 981->985 982->983 983->972 986 2ac306e-2ac3078 984->986 987 2ac3080-2ac308d 984->987 988 2ac31b4 985->988 989 2ac3176-2ac31a5 NtSetContextThread 985->989 986->984 987->970 988->977 989->988 990 2ac31a7-2ac31b2 NtResumeThread 989->990 990->911 990->988
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: 1dc2a362b87ad2d39c60852800c9d889547ed19660a126345e023749c8c5aea4
                                            • Instruction ID: ebe1b631431b78faec4d11cccff5ec8e4bde917b30d39e334cb0d2ed1c11a077
                                            • Opcode Fuzzy Hash: 1dc2a362b87ad2d39c60852800c9d889547ed19660a126345e023749c8c5aea4
                                            • Instruction Fuzzy Hash: D1E138B2D00259AFDF11DFA4DD80AEDBBB9FF04314F2484AAE515A7201DB309A95CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 991 2ac07ee-2ac07ef 992 2ac2ce8-2ac2d05 991->992 993 2ac07f5-2ac1f8f 991->993 997 2ac2d5c-2ac2d68 call 2ac32d7 992->997 998 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 992->998 993->992 1003 2ac2d6e-2ac2e5b call 2ac3228 * 12 997->1003 1004 2ac31cb-2ac31d1 997->1004 998->1004 1008 2ac2d52-2ac2d57 998->1008 1003->1004 1032 2ac2e61-2ac2e64 1003->1032 1008->997 1032->1004 1033 2ac2e6a-2ac2e6d 1032->1033 1033->1004 1034 2ac2e73-2ac2e76 1033->1034 1034->1004 1035 2ac2e7c-2ac2e7f 1034->1035 1035->1004 1036 2ac2e85-2ac2e88 1035->1036 1036->1004 1037 2ac2e8e-2ac2e91 1036->1037 1037->1004 1038 2ac2e97-2ac2e9a 1037->1038 1038->1004 1039 2ac2ea0-2ac2ea3 1038->1039 1039->1004 1040 2ac2ea9-2ac2eac 1039->1040 1040->1004 1041 2ac2eb2-2ac2eb4 1040->1041 1041->1004 1042 2ac2eba-2ac2ec8 1041->1042 1043 2ac2ecd-2ac2efe NtCreateSection 1042->1043 1044 2ac2eca 1042->1044 1043->1004 1045 2ac2f04-2ac2f26 NtMapViewOfSection 1043->1045 1044->1043 1045->1004 1046 2ac2f2c-2ac2f62 call 2ac32b8 1045->1046 1049 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 1046->1049 1050 2ac2f64-2ac2f6a 1046->1050 1061 2ac308f-2ac309b GetPEB 1049->1061 1062 2ac2fca-2ac3041 1049->1062 1051 2ac2f6f-2ac2f73 1050->1051 1053 2ac2f8b-2ac2f98 1051->1053 1054 2ac2f75-2ac2f88 call 2ac32b8 1051->1054 1053->1049 1057 2ac2f6c 1053->1057 1054->1053 1057->1051 1063 2ac309e-2ac30a5 1061->1063 1066 2ac3043-2ac3053 1062->1066 1065 2ac30b2-2ac30cf CreateProcessW 1063->1065 1065->1004 1067 2ac30d5-2ac30f0 NtGetContextThread 1065->1067 1066->1066 1068 2ac3055-2ac3058 1066->1068 1069 2ac30f6-2ac3116 NtReadVirtualMemory 1067->1069 1070 2ac31b7-2ac31ba 1067->1070 1071 2ac3066-2ac306a 1068->1071 1069->1070 1074 2ac311c-2ac3140 NtWriteVirtualMemory 1069->1074 1075 2ac31bc-2ac31bd 1070->1075 1076 2ac31c3-2ac31c6 1070->1076 1072 2ac306c 1071->1072 1073 2ac305a-2ac3065 1071->1073 1077 2ac3079-2ac307e 1072->1077 1073->1071 1074->1070 1078 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 1074->1078 1075->1076 1076->1065 1079 2ac306e-2ac3078 1077->1079 1080 2ac3080-2ac308d 1077->1080 1081 2ac31b4 1078->1081 1082 2ac3176-2ac31a5 NtSetContextThread 1078->1082 1079->1077 1080->1063 1081->1070 1082->1081 1083 2ac31a7-2ac31b2 NtResumeThread 1082->1083 1083->1004 1083->1081
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: 63054d0c8e892c1adb48c95d6363ace412f375d3d238f662ee97bf82abb7f58f
                                            • Instruction ID: 7409567e494edded71def02ec155d1146136425a365a5cc265b46d4dccfb5c4a
                                            • Opcode Fuzzy Hash: 63054d0c8e892c1adb48c95d6363ace412f375d3d238f662ee97bf82abb7f58f
                                            • Instruction Fuzzy Hash: 91E137B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE515A7201DB309A95CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1177 2ac0c98-2ac1813 1179 2ac2ce8-2ac2d05 1177->1179 1180 2ac1819 1177->1180 1182 2ac2d5c-2ac2d68 call 2ac32d7 1179->1182 1183 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 1179->1183 1180->1179 1188 2ac2d6e-2ac2e5b call 2ac3228 * 12 1182->1188 1189 2ac31cb-2ac31d1 1182->1189 1183->1189 1193 2ac2d52-2ac2d57 1183->1193 1188->1189 1217 2ac2e61-2ac2e64 1188->1217 1193->1182 1217->1189 1218 2ac2e6a-2ac2e6d 1217->1218 1218->1189 1219 2ac2e73-2ac2e76 1218->1219 1219->1189 1220 2ac2e7c-2ac2e7f 1219->1220 1220->1189 1221 2ac2e85-2ac2e88 1220->1221 1221->1189 1222 2ac2e8e-2ac2e91 1221->1222 1222->1189 1223 2ac2e97-2ac2e9a 1222->1223 1223->1189 1224 2ac2ea0-2ac2ea3 1223->1224 1224->1189 1225 2ac2ea9-2ac2eac 1224->1225 1225->1189 1226 2ac2eb2-2ac2eb4 1225->1226 1226->1189 1227 2ac2eba-2ac2ec8 1226->1227 1228 2ac2ecd-2ac2efe NtCreateSection 1227->1228 1229 2ac2eca 1227->1229 1228->1189 1230 2ac2f04-2ac2f26 NtMapViewOfSection 1228->1230 1229->1228 1230->1189 1231 2ac2f2c-2ac2f62 call 2ac32b8 1230->1231 1234 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 1231->1234 1235 2ac2f64-2ac2f6a 1231->1235 1246 2ac308f-2ac309b GetPEB 1234->1246 1247 2ac2fca-2ac3041 1234->1247 1236 2ac2f6f-2ac2f73 1235->1236 1238 2ac2f8b-2ac2f98 1236->1238 1239 2ac2f75-2ac2f88 call 2ac32b8 1236->1239 1238->1234 1242 2ac2f6c 1238->1242 1239->1238 1242->1236 1248 2ac309e-2ac30a5 1246->1248 1251 2ac3043-2ac3053 1247->1251 1250 2ac30b2-2ac30cf CreateProcessW 1248->1250 1250->1189 1252 2ac30d5-2ac30f0 NtGetContextThread 1250->1252 1251->1251 1253 2ac3055-2ac3058 1251->1253 1254 2ac30f6-2ac3116 NtReadVirtualMemory 1252->1254 1255 2ac31b7-2ac31ba 1252->1255 1256 2ac3066-2ac306a 1253->1256 1254->1255 1259 2ac311c-2ac3140 NtWriteVirtualMemory 1254->1259 1260 2ac31bc-2ac31bd 1255->1260 1261 2ac31c3-2ac31c6 1255->1261 1257 2ac306c 1256->1257 1258 2ac305a-2ac3065 1256->1258 1262 2ac3079-2ac307e 1257->1262 1258->1256 1259->1255 1263 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 1259->1263 1260->1261 1261->1250 1264 2ac306e-2ac3078 1262->1264 1265 2ac3080-2ac308d 1262->1265 1266 2ac31b4 1263->1266 1267 2ac3176-2ac31a5 NtSetContextThread 1263->1267 1264->1262 1265->1248 1266->1255 1267->1266 1268 2ac31a7-2ac31b2 NtResumeThread 1267->1268 1268->1189 1268->1266
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: 8f7e58425d88959d612763d6fb43d0263cacee27f7726eade9dd205014e34f6d
                                            • Instruction ID: 02a7281730424e0d73ca83449c610f40a4ba87accc27e332db02839fb30c22fd
                                            • Opcode Fuzzy Hash: 8f7e58425d88959d612763d6fb43d0263cacee27f7726eade9dd205014e34f6d
                                            • Instruction Fuzzy Hash: FEE138B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE514A7201DB349A95CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1269 2ac115c-2ac115f 1271 2ac2ce8-2ac2d05 1269->1271 1272 2ac1165-2ac28aa 1269->1272 1275 2ac2d5c-2ac2d68 call 2ac32d7 1271->1275 1276 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 1271->1276 1272->1271 1281 2ac2d6e-2ac2e5b call 2ac3228 * 12 1275->1281 1282 2ac31cb-2ac31d1 1275->1282 1276->1282 1286 2ac2d52-2ac2d57 1276->1286 1281->1282 1310 2ac2e61-2ac2e64 1281->1310 1286->1275 1310->1282 1311 2ac2e6a-2ac2e6d 1310->1311 1311->1282 1312 2ac2e73-2ac2e76 1311->1312 1312->1282 1313 2ac2e7c-2ac2e7f 1312->1313 1313->1282 1314 2ac2e85-2ac2e88 1313->1314 1314->1282 1315 2ac2e8e-2ac2e91 1314->1315 1315->1282 1316 2ac2e97-2ac2e9a 1315->1316 1316->1282 1317 2ac2ea0-2ac2ea3 1316->1317 1317->1282 1318 2ac2ea9-2ac2eac 1317->1318 1318->1282 1319 2ac2eb2-2ac2eb4 1318->1319 1319->1282 1320 2ac2eba-2ac2ec8 1319->1320 1321 2ac2ecd-2ac2efe NtCreateSection 1320->1321 1322 2ac2eca 1320->1322 1321->1282 1323 2ac2f04-2ac2f26 NtMapViewOfSection 1321->1323 1322->1321 1323->1282 1324 2ac2f2c-2ac2f62 call 2ac32b8 1323->1324 1327 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 1324->1327 1328 2ac2f64-2ac2f6a 1324->1328 1339 2ac308f-2ac309b GetPEB 1327->1339 1340 2ac2fca-2ac3041 1327->1340 1329 2ac2f6f-2ac2f73 1328->1329 1331 2ac2f8b-2ac2f98 1329->1331 1332 2ac2f75-2ac2f88 call 2ac32b8 1329->1332 1331->1327 1335 2ac2f6c 1331->1335 1332->1331 1335->1329 1341 2ac309e-2ac30a5 1339->1341 1344 2ac3043-2ac3053 1340->1344 1343 2ac30b2-2ac30cf CreateProcessW 1341->1343 1343->1282 1345 2ac30d5-2ac30f0 NtGetContextThread 1343->1345 1344->1344 1346 2ac3055-2ac3058 1344->1346 1347 2ac30f6-2ac3116 NtReadVirtualMemory 1345->1347 1348 2ac31b7-2ac31ba 1345->1348 1349 2ac3066-2ac306a 1346->1349 1347->1348 1352 2ac311c-2ac3140 NtWriteVirtualMemory 1347->1352 1353 2ac31bc-2ac31bd 1348->1353 1354 2ac31c3-2ac31c6 1348->1354 1350 2ac306c 1349->1350 1351 2ac305a-2ac3065 1349->1351 1355 2ac3079-2ac307e 1350->1355 1351->1349 1352->1348 1356 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 1352->1356 1353->1354 1354->1343 1357 2ac306e-2ac3078 1355->1357 1358 2ac3080-2ac308d 1355->1358 1359 2ac31b4 1356->1359 1360 2ac3176-2ac31a5 NtSetContextThread 1356->1360 1357->1355 1358->1341 1359->1348 1360->1359 1361 2ac31a7-2ac31b2 NtResumeThread 1360->1361 1361->1282 1361->1359
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: 72acc7db67e8a8a3f14a846a6f884e9cd4b50e9c66c3d713838c70737369f9a0
                                            • Instruction ID: a608f2d319585f35f695b7d9978167a6821df2c1fb10ca7c9eb6ff8f9a89b51b
                                            • Opcode Fuzzy Hash: 72acc7db67e8a8a3f14a846a6f884e9cd4b50e9c66c3d713838c70737369f9a0
                                            • Instruction Fuzzy Hash: E2E127B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE515A7201DB309A95CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1084 2ac075f-2ac0a69 1086 2ac0a6f-2ac256c 1084->1086 1087 2ac2ce8-2ac2d05 1084->1087 1086->1087 1090 2ac2d5c-2ac2d68 call 2ac32d7 1087->1090 1091 2ac2d07-2ac2d4c call 2ac31d4 call 2ac32d7 1087->1091 1096 2ac2d6e-2ac2e5b call 2ac3228 * 12 1090->1096 1097 2ac31cb-2ac31d1 1090->1097 1091->1097 1101 2ac2d52-2ac2d57 1091->1101 1096->1097 1125 2ac2e61-2ac2e64 1096->1125 1101->1090 1125->1097 1126 2ac2e6a-2ac2e6d 1125->1126 1126->1097 1127 2ac2e73-2ac2e76 1126->1127 1127->1097 1128 2ac2e7c-2ac2e7f 1127->1128 1128->1097 1129 2ac2e85-2ac2e88 1128->1129 1129->1097 1130 2ac2e8e-2ac2e91 1129->1130 1130->1097 1131 2ac2e97-2ac2e9a 1130->1131 1131->1097 1132 2ac2ea0-2ac2ea3 1131->1132 1132->1097 1133 2ac2ea9-2ac2eac 1132->1133 1133->1097 1134 2ac2eb2-2ac2eb4 1133->1134 1134->1097 1135 2ac2eba-2ac2ec8 1134->1135 1136 2ac2ecd-2ac2efe NtCreateSection 1135->1136 1137 2ac2eca 1135->1137 1136->1097 1138 2ac2f04-2ac2f26 NtMapViewOfSection 1136->1138 1137->1136 1138->1097 1139 2ac2f2c-2ac2f62 call 2ac32b8 1138->1139 1142 2ac2f9a-2ac2fc4 call 2ac3315 call 2ac32b8 1139->1142 1143 2ac2f64-2ac2f6a 1139->1143 1154 2ac308f-2ac309b GetPEB 1142->1154 1155 2ac2fca-2ac3041 1142->1155 1144 2ac2f6f-2ac2f73 1143->1144 1146 2ac2f8b-2ac2f98 1144->1146 1147 2ac2f75-2ac2f88 call 2ac32b8 1144->1147 1146->1142 1150 2ac2f6c 1146->1150 1147->1146 1150->1144 1156 2ac309e-2ac30a5 1154->1156 1159 2ac3043-2ac3053 1155->1159 1158 2ac30b2-2ac30cf CreateProcessW 1156->1158 1158->1097 1160 2ac30d5-2ac30f0 NtGetContextThread 1158->1160 1159->1159 1161 2ac3055-2ac3058 1159->1161 1162 2ac30f6-2ac3116 NtReadVirtualMemory 1160->1162 1163 2ac31b7-2ac31ba 1160->1163 1164 2ac3066-2ac306a 1161->1164 1162->1163 1167 2ac311c-2ac3140 NtWriteVirtualMemory 1162->1167 1168 2ac31bc-2ac31bd 1163->1168 1169 2ac31c3-2ac31c6 1163->1169 1165 2ac306c 1164->1165 1166 2ac305a-2ac3065 1164->1166 1170 2ac3079-2ac307e 1165->1170 1166->1164 1167->1163 1171 2ac3142-2ac3174 NtUnmapViewOfSection NtMapViewOfSection 1167->1171 1168->1169 1169->1158 1172 2ac306e-2ac3078 1170->1172 1173 2ac3080-2ac308d 1170->1173 1174 2ac31b4 1171->1174 1175 2ac3176-2ac31a5 NtSetContextThread 1171->1175 1172->1170 1173->1156 1174->1163 1175->1174 1176 2ac31a7-2ac31b2 NtResumeThread 1175->1176 1176->1097 1176->1174
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: 399a782b03df6b69f1b3adb00e789070ed9034e4c1ef35daa5869330bbd6db94
                                            • Instruction ID: ccc0f55419e2d2732ada34aa16a0597e68f10fc1a2656214420dd8ea8fd625bf
                                            • Opcode Fuzzy Hash: 399a782b03df6b69f1b3adb00e789070ed9034e4c1ef35daa5869330bbd6db94
                                            • Instruction Fuzzy Hash: 1EE138B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE515A7201DB309A95CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: c11d16e35c8ddbe8aa9d564b90f02865ec1bd529ab3ace37a80ee9ac50e4c2bc
                                            • Instruction ID: 581a3b951eba01ad2aabba54f80218d6d173de9435508b8c4aa15c0ec60f9ea7
                                            • Opcode Fuzzy Hash: c11d16e35c8ddbe8aa9d564b90f02865ec1bd529ab3ace37a80ee9ac50e4c2bc
                                            • Instruction Fuzzy Hash: 2AE147B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE514A7201DB309A95CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: e63d8900bee1e6888fd2d0b6fef9350bb3a698b6526d9974880eefaac9083743
                                            • Instruction ID: afe07c6b9f983da621dd049f289e67b8fdede8782ef45969ac9a98252a021236
                                            • Opcode Fuzzy Hash: e63d8900bee1e6888fd2d0b6fef9350bb3a698b6526d9974880eefaac9083743
                                            • Instruction Fuzzy Hash: 16E137B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE514A7201DB349A95CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: 1726100f0a7944f9e071800c03af4a47d0c414425da52bf7404932ec35a1c1ee
                                            • Instruction ID: 5a265f776c394ca38e1676274d249c38f82c3b3ec896302ef703dd495edf4d2b
                                            • Opcode Fuzzy Hash: 1726100f0a7944f9e071800c03af4a47d0c414425da52bf7404932ec35a1c1ee
                                            • Instruction Fuzzy Hash: C4E127B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE515A7201DB309A95CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 0-1087957892
                                            • Opcode ID: e6c0749d89e24c5319b546a662c51c185ff1c2a120229c4b4c71efa9ff22db79
                                            • Instruction ID: 8b98a150dc77f9f585e961e5c7cc9f31b34c9e2ad57364042ca69534456c7344
                                            • Opcode Fuzzy Hash: e6c0749d89e24c5319b546a662c51c185ff1c2a120229c4b4c71efa9ff22db79
                                            • Instruction Fuzzy Hash: 3DE137B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE514A7201DB349A95CF54
                                            APIs
                                            • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 02AC2EF2
                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02AC2F1F
                                            • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 02AC30CA
                                            • NtGetContextThread.NTDLL(?,?), ref: 02AC30E9
                                            • NtReadVirtualMemory.NTDLL(?,?,?,000001D8,?), ref: 02AC310F
                                            • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 02AC3139
                                            • NtUnmapViewOfSection.NTDLL(?,?), ref: 02AC3154
                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02AC316D
                                            • NtSetContextThread.NTDLL(?,00010003), ref: 02AC319E
                                            • NtResumeThread.NTDLL(?,00000000), ref: 02AC31AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: Section$ThreadView$ContextCreateMemoryVirtual$ProcessReadResumeUnmapWrite
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 1951729442-1087957892
                                            • Opcode ID: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                                            • Instruction ID: a5ff1e2909e89c768d973b527ef73046bbd64cdc96237a007ab99087f4c72e33
                                            • Opcode Fuzzy Hash: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                                            • Instruction Fuzzy Hash: A4E116B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE515A7200DB349A95CF54
                                            APIs
                                            • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 02AC2EF2
                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02AC2F1F
                                            • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 02AC30CA
                                            • NtGetContextThread.NTDLL(?,?), ref: 02AC30E9
                                            • NtReadVirtualMemory.NTDLL(?,?,?,000001D8,?), ref: 02AC310F
                                            • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 02AC3139
                                            • NtUnmapViewOfSection.NTDLL(?,?), ref: 02AC3154
                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02AC316D
                                            • NtSetContextThread.NTDLL(?,00010003), ref: 02AC319E
                                            • NtResumeThread.NTDLL(?,00000000), ref: 02AC31AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: Section$ThreadView$ContextCreateMemoryVirtual$ProcessReadResumeUnmapWrite
                                            • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                            • API String ID: 1951729442-1087957892
                                            • Opcode ID: fadb8ee45684e55940828a746d8dba969003a9b897a4444178c65d01c4fec658
                                            • Instruction ID: 7a17c06fb20b6c780ded4a63667ad79aa590e1518409a592e02b773ffdd5c574
                                            • Opcode Fuzzy Hash: fadb8ee45684e55940828a746d8dba969003a9b897a4444178c65d01c4fec658
                                            • Instruction Fuzzy Hash: CFE147B2D00259AFDF11DFA4DD80AEDBBB9FF08314F2484AAE514A7241DB309A95CF54
                                            APIs
                                            • NtAllocateVirtualMemory.NTDLL(000000FF,00000100,00000000,00000100,00003000,00000040,?,NtQueryInformationProcess,7E65173F,?,NtQueryInformationProcess,7E651759,?,NtQueryInformationProcess,7E651728,NtQueryInformationProcess), ref: 7E652A72
                                            • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,00000040,?,?,NtQueryInformationProcess,7E65173F,?,NtQueryInformationProcess,7E651759,?,NtQueryInformationProcess,7E651728,NtQueryInformationProcess,7E6517CA), ref: 7E652A9D
                                            • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,?,?,?,NtQueryInformationProcess,7E65173F,?,NtQueryInformationProcess,7E651759,?,NtQueryInformationProcess,7E651728,NtQueryInformationProcess,7E6517CA), ref: 7E652B99
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: MemoryVirtual$Protect$Allocate
                                            • String ID: NtQueryInformationProcess
                                            • API String ID: 955180148-2781105232
                                            • Opcode ID: 37c4d548869026d4b1447d3183d347c17864294fe67c6895446152d6c5ccd549
                                            • Instruction ID: ad0dffdac434b37b9f037c47c14d09b0e67708faa9d930f09ab17e99cfd82f45
                                            • Opcode Fuzzy Hash: 37c4d548869026d4b1447d3183d347c17864294fe67c6895446152d6c5ccd549
                                            • Instruction Fuzzy Hash: 0851DE79A0450AAFDB01CFA9CC40B9EBBBBFF84314F10430AE510E63D4E3B496458B62
                                            APIs
                                            • NtQueryInformationProcess.NTDLL(?,00000022,?,?,?), ref: 7E652BED
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: InformationProcessQuery
                                            • String ID: "
                                            • API String ID: 1778838933-123907689
                                            • Opcode ID: f8a3bf583f533df3510b7bb5a4c0cb12b665dd011632cc013e315b81883adf6f
                                            • Instruction ID: dae836b30825074f43343f222d4766c7eb0be9f645514223a6dfe7d6762e4dae
                                            • Opcode Fuzzy Hash: f8a3bf583f533df3510b7bb5a4c0cb12b665dd011632cc013e315b81883adf6f
                                            • Instruction Fuzzy Hash: C9F01C7921120AEFDF028F51DD01B9A3B7BFF06358F008515FE169A6A0C776C5A1DB61
                                            APIs
                                            • NtSetInformationProcess.NTDLL ref: 7E84B4D6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: InformationProcess
                                            • String ID: 0
                                            • API String ID: 1801817001-4108050209
                                            • Opcode ID: 813e5d162c089125476380ee3ff570c6249d4e6f857f074f341f52f951960ca6
                                            • Instruction ID: 225ea98cec08df4f42dd0e2104dee42eb3c37c335fb5f50d95eb5d21161ab906
                                            • Opcode Fuzzy Hash: 813e5d162c089125476380ee3ff570c6249d4e6f857f074f341f52f951960ca6
                                            • Instruction Fuzzy Hash: 56E065B958464CBBDB20DFD98E09B99BBBCE705B14F600245FA00667C0C378190486B5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 7e846120-7e8464c7 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat call 7e84a060 __vbaStrVarVal #644 GetModuleHandleW __vbaFreeStrList __vbaFreeVarList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaRedim __vbaNew __vbaObjSet __vbaCastObj __vbaObjSet __vbaObjSetAddref __vbaFreeObjList __vbaObjSetAddref #644 __vbaFreeObj #644 call 7e65308e call 7e65309d 7 7e8464cd-7e8464d0 0->7 8 7e8464d2-7e846531 __vbaAryLock #644 __vbaAryUnlock call 7e65308e 7->8 9 7e846533-7e8466b9 __vbaObjSetAddref #644 __vbaFreeObj #644 call 7e6530ab __vbaAryLock #644 __vbaAryUnlock #644 call 7e65308e __vbaRedim #644 call 7e65308e #644 call 7e65308e __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 7->9 8->7 20 7e8466d2-7e846715 __vbaAryUnlock __vbaFreeStr #644 call 7e65308e call 7e65309d 9->20 21 7e8466bb-7e8466cc __vbaHresultCheckObj 9->21 26 7e84671b-7e84671d 20->26 21->20 27 7e846776-7e84687d #644 call 7e65308e #644 call 7e65308e #644 call 7e65308e #644 call 7e65308e #644 call 7e65308e VirtualProtect 26->27 28 7e84671f-7e846774 __vbaAryLock #644 __vbaAryUnlock call 7e65308e 26->28 41 7e846896-7e8468a8 call 7e65309d 27->41 42 7e84687f-7e846890 __vbaHresultCheckObj 27->42 28->26 45 7e8468ae-7e8468b0 41->45 42->41 46 7e8468b2-7e846901 __vbaAryLock #644 __vbaAryUnlock call 7e65308e 45->46 47 7e846903-7e8469e8 #644 call 7e65308e #644 call 7e65308e #644 call 7e65308e call 7e846c10 __vbaFreeVar __vbaAryDestruct 45->47 46->45
                                            APIs
                                            • __vbaStrCat.MSVBVM60(7E65E748,7E65E740,?,6D2E60EF), ref: 7E8461B5
                                            • __vbaStrMove.MSVBVM60(?,6D2E60EF), ref: 7E8461C2
                                            • __vbaStrCat.MSVBVM60(bvm,00000000,?,6D2E60EF), ref: 7E8461CA
                                            • __vbaStrMove.MSVBVM60(?,6D2E60EF), ref: 7E8461D1
                                            • __vbaStrCat.MSVBVM60(7E65E760,00000000,?,6D2E60EF), ref: 7E8461D9
                                            • __vbaStrMove.MSVBVM60(?,6D2E60EF), ref: 7E8461E0
                                            • #644.MSVBVM60(00000000,?,6D2E60EF), ref: 7E8461E3
                                            • GetModuleHandleW.KERNEL32(00000000,?,6D2E60EF), ref: 7E8461EA
                                            • __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,6D2E60EF), ref: 7E846203
                                            • __vbaStrCat.MSVBVM60(lFunctionCal,7E65E76C), ref: 7E846216
                                            • __vbaStrMove.MSVBVM60 ref: 7E84621D
                                            • __vbaStrCat.MSVBVM60(7E65E798,00000000), ref: 7E846225
                                            • __vbaStrMove.MSVBVM60 ref: 7E84622C
                                            • __vbaStrToAnsi.MSVBVM60(?,00000000), ref: 7E846233
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 7E846241
                                            • __vbaFreeStrList.MSVBVM60(00000003,?,?,?), ref: 7E84625A
                                            • __vbaStrCat.MSVBVM60(eVrVnV,7E65E7A0), ref: 7E84626D
                                            • __vbaStrMove.MSVBVM60 ref: 7E846274
                                            • __vbaStrCat.MSVBVM60(eVlV3V2V,00000000), ref: 7E84627C
                                              • Part of subcall function 7E84A060: __vbaVarDup.MSVBVM60(6D1FD8B1,6D1EA323), ref: 7E84A0A0
                                              • Part of subcall function 7E84A060: #653.MSVBVM60(?,?), ref: 7E84A0AE
                                              • Part of subcall function 7E84A060: __vbaI4Var.MSVBVM60(?), ref: 7E84A0B8
                                              • Part of subcall function 7E84A060: __vbaFreeVar.MSVBVM60 ref: 7E84A0CE
                                              • Part of subcall function 7E84A060: #632.MSVBVM60(?,?,?,?), ref: 7E84A0FA
                                              • Part of subcall function 7E84A060: __vbaVarCat.MSVBVM60(?,?,?), ref: 7E84A10C
                                              • Part of subcall function 7E84A060: __vbaVarMove.MSVBVM60 ref: 7E84A117
                                              • Part of subcall function 7E84A060: __vbaFreeVarList.MSVBVM60(00000002,00000002,?), ref: 7E84A123
                                              • Part of subcall function 7E84A060: __vbaFreeVar.MSVBVM60(7E84A168), ref: 7E84A161
                                            • __vbaStrVarVal.MSVBVM60(?,?,?), ref: 7E8462B6
                                            • #644.MSVBVM60(00000000), ref: 7E8462BD
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 7E8462C4
                                            • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 7E8462D9
                                            • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 7E8462EC
                                            • __vbaStrCat.MSVBVM60(7E65E7E0,7E65E7D8), ref: 7E8462FF
                                            • __vbaStrMove.MSVBVM60 ref: 7E846306
                                            • __vbaStrCat.MSVBVM60(7E65E7E8,00000000), ref: 7E84630E
                                            • __vbaStrMove.MSVBVM60 ref: 7E846315
                                            • __vbaStrCat.MSVBVM60(7E65E7F0,00000000), ref: 7E84631D
                                            • __vbaStrMove.MSVBVM60 ref: 7E846324
                                            • __vbaStrCat.MSVBVM60(7E65E7F8,00000000), ref: 7E84632C
                                            • __vbaStrMove.MSVBVM60 ref: 7E846333
                                            • __vbaStrCat.MSVBVM60(7E65E800,00000000), ref: 7E84633B
                                            • __vbaStrMove.MSVBVM60 ref: 7E846342
                                            • __vbaStrCat.MSVBVM60(7E65E798,00000000), ref: 7E84634A
                                            • __vbaStrMove.MSVBVM60 ref: 7E846351
                                            • __vbaStrCat.MSVBVM60(7E65E808,00000000), ref: 7E846359
                                            • __vbaStrMove.MSVBVM60 ref: 7E846360
                                            • __vbaStrCat.MSVBVM60(7E65E7E8,00000000), ref: 7E846368
                                            • __vbaStrMove.MSVBVM60 ref: 7E84636F
                                            • __vbaStrCat.MSVBVM60(7E65E810,00000000), ref: 7E846377
                                            • __vbaStrMove.MSVBVM60 ref: 7E84637E
                                            • __vbaStrCat.MSVBVM60(7E65E7F0,00000000), ref: 7E846386
                                            • __vbaStrMove.MSVBVM60 ref: 7E84638D
                                            • __vbaStrCat.MSVBVM60(7E65E818,00000000), ref: 7E846395
                                            • __vbaStrMove.MSVBVM60 ref: 7E84639C
                                            • __vbaStrCat.MSVBVM60(7E65E820,00000000), ref: 7E8463A4
                                            • __vbaStrMove.MSVBVM60 ref: 7E8463AB
                                            • __vbaStrCat.MSVBVM60(7E65E7F0,00000000), ref: 7E8463B3
                                            • __vbaStrMove.MSVBVM60 ref: 7E8463BA
                                            • __vbaStrToAnsi.MSVBVM60(?,00000000), ref: 7E8463C1
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 7E8463CE
                                            • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 7E846413
                                            • __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,0000000F,00000000), ref: 7E84642B
                                            • __vbaNew.MSVBVM60(7E65E844,7E65E854), ref: 7E84643E
                                            • __vbaObjSet.MSVBVM60(?,00000000), ref: 7E846449
                                            • __vbaCastObj.MSVBVM60(00000000), ref: 7E846450
                                            • __vbaObjSet.MSVBVM60(?,00000000), ref: 7E84645B
                                            • __vbaObjSetAddref.MSVBVM60(7E8B32D0,00000000), ref: 7E846468
                                            • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 7E846478
                                            • __vbaObjSetAddref.MSVBVM60(?), ref: 7E84648D
                                            • #644.MSVBVM60(00000000), ref: 7E846494
                                            • __vbaFreeObj.MSVBVM60 ref: 7E8464A0
                                            • #644.MSVBVM60(?), ref: 7E8464AA
                                            • __vbaAryLock.MSVBVM60(?,?), ref: 7E8464DA
                                            • #644.MSVBVM60(?), ref: 7E8464F2
                                            • __vbaAryUnlock.MSVBVM60(?), ref: 7E846502
                                            • __vbaObjSetAddref.MSVBVM60(?), ref: 7E846540
                                            • #644.MSVBVM60(00000000), ref: 7E846547
                                            • __vbaFreeObj.MSVBVM60 ref: 7E846553
                                            • #644.MSVBVM60(7E8B32CC), ref: 7E846563
                                            • __vbaAryLock.MSVBVM60(?,?), ref: 7E846583
                                            • #644.MSVBVM60(?), ref: 7E846598
                                            • __vbaAryUnlock.MSVBVM60(?), ref: 7E8465A8
                                            • #644.MSVBVM60(?), ref: 7E8465C1
                                            • __vbaRedim.MSVBVM60(00000080,00000004,7E8B3214,00000003,00000001,00000010,00000000), ref: 7E8465FD
                                            • #644.MSVBVM60(?), ref: 7E84660A
                                            • #644.MSVBVM60(?), ref: 7E846630
                                            • __vbaAryLock.MSVBVM60(?,00000000), ref: 7E84665C
                                            • __vbaStrCat.MSVBVM60(7E65E87C,7E65E874,?,00000040), ref: 7E846692
                                            • __vbaStrMove.MSVBVM60 ref: 7E846699
                                            • __vbaI4Str.MSVBVM60(00000000), ref: 7E84669C
                                            • VirtualProtect.KERNELBASE(?,00000000), ref: 7E8466B2
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65E854,0000002C,?,00000000), ref: 7E8466CC
                                            • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 7E8466D6
                                            • __vbaFreeStr.MSVBVM60(?,00000000), ref: 7E8466DF
                                            • #644.MSVBVM60(?,?,00000000), ref: 7E8466EF
                                            • __vbaAryLock.MSVBVM60(?,00000000,?,00000000), ref: 7E84672A
                                            • #644.MSVBVM60(?,?,00000000), ref: 7E846741
                                            • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 7E84674D
                                            • #644.MSVBVM60(00000040,?,00000000), ref: 7E846787
                                            • #644.MSVBVM60(0424448B,?,00000000), ref: 7E8467AD
                                            • #644.MSVBVM60(408B008B,?,00000000), ref: 7E8467D3
                                            • #644.MSVBVM60(20C4832C,?,00000000), ref: 7E8467F9
                                            • #644.MSVBVM60(E02474FF,?,00000000), ref: 7E84681F
                                            • VirtualProtect.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000040,?,?,00000000), ref: 7E846876
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65E854,00000020,?,00000000), ref: 7E846890
                                            • __vbaAryLock.MSVBVM60(?,00000000,?,00000000), ref: 7E8468BC
                                            • #644.MSVBVM60(?,?,00000000), ref: 7E8468D3
                                            • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 7E8468DF
                                            • #644.MSVBVM60(7E8B32CC,?,00000000), ref: 7E84690C
                                            • #644.MSVBVM60(00000000,?,00000000), ref: 7E846925
                                            • #644.MSVBVM60(-00000004,?,00000000), ref: 7E84693D
                                            • __vbaFreeVar.MSVBVM60(?,?,00000000), ref: 7E84695B
                                            • __vbaAryDestruct.MSVBVM60(00000000,?,7E8469E9,?,00000000), ref: 7E8469E2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$#644$Move$Free$List$LockUnlock$Addref$AddressAnsiCheckHandleHresultModuleProcProtectRedimVirtual$#632#653CastDestruct
                                            • String ID: @$bvm$eVlV3V2V$eVrVnV$lFunctionCal
                                            • API String ID: 1415243137-1337920422
                                            • Opcode ID: a4c715c8e5b50ab387ae7f318a8e9db19b7e94f236d70215b0e1d9c99e0810c9
                                            • Instruction ID: 992e9bdbfe247293e43a5ecfb8f57e8dd7962804efd43e93ddc646fe7a8ae393
                                            • Opcode Fuzzy Hash: a4c715c8e5b50ab387ae7f318a8e9db19b7e94f236d70215b0e1d9c99e0810c9
                                            • Instruction Fuzzy Hash: 5A42B8B6A40219AFDB14DFA5CC88EEEBBB9FF48300F10855AE505E7344DA74A945CF60
                                            APIs
                                            • __vbaFreeVar.MSVBVM60 ref: 7E84B319
                                            • __vbaFreeVar.MSVBVM60(00000000), ref: 7E84B327
                                              • Part of subcall function 7E846120: __vbaStrCat.MSVBVM60(7E65E748,7E65E740,?,6D2E60EF), ref: 7E8461B5
                                              • Part of subcall function 7E846120: __vbaStrMove.MSVBVM60(?,6D2E60EF), ref: 7E8461C2
                                              • Part of subcall function 7E846120: __vbaStrCat.MSVBVM60(bvm,00000000,?,6D2E60EF), ref: 7E8461CA
                                              • Part of subcall function 7E846120: __vbaStrMove.MSVBVM60(?,6D2E60EF), ref: 7E8461D1
                                              • Part of subcall function 7E846120: __vbaStrCat.MSVBVM60(7E65E760,00000000,?,6D2E60EF), ref: 7E8461D9
                                              • Part of subcall function 7E846120: __vbaStrMove.MSVBVM60(?,6D2E60EF), ref: 7E8461E0
                                              • Part of subcall function 7E846120: #644.MSVBVM60(00000000,?,6D2E60EF), ref: 7E8461E3
                                              • Part of subcall function 7E846120: GetModuleHandleW.KERNEL32(00000000,?,6D2E60EF), ref: 7E8461EA
                                              • Part of subcall function 7E846120: __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,6D2E60EF), ref: 7E846203
                                              • Part of subcall function 7E846120: __vbaStrCat.MSVBVM60(lFunctionCal,7E65E76C), ref: 7E846216
                                              • Part of subcall function 7E846120: __vbaStrMove.MSVBVM60 ref: 7E84621D
                                              • Part of subcall function 7E846120: __vbaStrCat.MSVBVM60(7E65E798,00000000), ref: 7E846225
                                              • Part of subcall function 7E846120: __vbaStrMove.MSVBVM60 ref: 7E84622C
                                              • Part of subcall function 7E846120: __vbaStrToAnsi.MSVBVM60(?,00000000), ref: 7E846233
                                              • Part of subcall function 7E846120: GetProcAddress.KERNEL32(00000000,00000000), ref: 7E846241
                                              • Part of subcall function 7E84B490: NtSetInformationProcess.NTDLL ref: 7E84B4D6
                                            • __vbaFreeVar.MSVBVM60(00000000), ref: 7E84B33A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$Move$Free$#644AddressAnsiHandleInformationListModuleProcProcess
                                            • String ID:
                                            • API String ID: 115556252-0
                                            • Opcode ID: c627caf685b3f936fcd3761dc35067aa1d4c29c88f0e1378b341515b87ead3ce
                                            • Instruction ID: 61cf71c9cffd4c284e370245224c292c2245347dfeff7efd73bb6fda44aec335
                                            • Opcode Fuzzy Hash: c627caf685b3f936fcd3761dc35067aa1d4c29c88f0e1378b341515b87ead3ce
                                            • Instruction Fuzzy Hash: 2B0128B981462CEBCF10DFA5CD44EEEBB78FF09604F405529E50567354DB386A05CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: NtQueryInformationProcess
                                            • API String ID: 0-2781105232
                                            • Opcode ID: f88e251bd6240c739b11586f1affd826d0e22b120c2b2395e00a48deb75ff214
                                            • Instruction ID: 5f9e9f949a59730e3fb4e431708a1512881fcedcc9ae6c3436aa78fc6f2eeed8
                                            • Opcode Fuzzy Hash: f88e251bd6240c739b11586f1affd826d0e22b120c2b2395e00a48deb75ff214
                                            • Instruction Fuzzy Hash: 70F0303CB64605EED7A19624CA40F2527BBBB05B10F109890B886EA7EBEB14E8418E15
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                                            • Instruction ID: 7f858a0d8d1d3b294386188b17463ae616b9b1ca142457894a5b8524f8a81929
                                            • Opcode Fuzzy Hash: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                                            • Instruction Fuzzy Hash: 69018C7A7941068BD721AB09E040996B3B7FB63760B852062E806DBFDCE325A8C0C711
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                                            • Instruction ID: 38acd6cdc99f8df1662cc8525de101ee6a3cd62b39974158c2241a3a351d82d5
                                            • Opcode Fuzzy Hash: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                                            • Instruction Fuzzy Hash: 49F0C9322145249BCF21EB59D58096AF7F9EF84A7072588D9E5599BA00DB30FC408B90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5316810a94766b1ca050ebca0f5f5a24f2eea664af7019078f40900b5b38d693
                                            • Instruction ID: dc4fb84528e1b97e0c53be9808bb9982d85089d79ecbae11b63579dabae03a5c
                                            • Opcode Fuzzy Hash: 5316810a94766b1ca050ebca0f5f5a24f2eea664af7019078f40900b5b38d693
                                            • Instruction Fuzzy Hash: 6BD0A974119441DEC298BB2081B07B573B2AB4C758F71082C91038E180CF250882CF2D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4c43a5081fe5d2bb3cd1689569c8f68dab492a46559b42270ac0312c03ebc32d
                                            • Instruction ID: 95dff2fb833417202495218693bf5b1a421dd4471ca0001524ddc04ad995461f
                                            • Opcode Fuzzy Hash: 4c43a5081fe5d2bb3cd1689569c8f68dab492a46559b42270ac0312c03ebc32d
                                            • Instruction Fuzzy Hash: 46B0123F0716C44DDB13CF3442137E93B6593004C0F5404C1D0C04B66BC00C8687D556
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 403b859c92bb87a22b3b23818d0f9761360f240456280570c354f149d4e95fe8
                                            • Instruction ID: 6d8b77ee072ee247f30958288c4a888cb08176c89a0772219baa462f0e89e92b
                                            • Opcode Fuzzy Hash: 403b859c92bb87a22b3b23818d0f9761360f240456280570c354f149d4e95fe8
                                            • Instruction Fuzzy Hash: 48B09234342640CFC205CE29C180F1473E8BB04A90F0244D0B800CB662C228ED80DA10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 09929421d99742cfa4a401d3ddfe35bd1712795acecd8ac35f43a2c4d427f48e
                                            • Instruction ID: 75d8ee55a9432d655d400c20f764b696a43bdfdc0ccd3be24d65f6ea96f8add4
                                            • Opcode Fuzzy Hash: 09929421d99742cfa4a401d3ddfe35bd1712795acecd8ac35f43a2c4d427f48e
                                            • Instruction Fuzzy Hash: 0CB012241015C18EC9024F1041127A877A0D7019C0F0A00C494C04B513C11C8645A610
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 10f67725e43095be341acf3cb58f55b81ea81c3134907c094f93d55dab3cd169
                                            • Instruction ID: c5ce0236b484b230147c8b687852133820aa994a246abfa6e232dd60afbbf360
                                            • Opcode Fuzzy Hash: 10f67725e43095be341acf3cb58f55b81ea81c3134907c094f93d55dab3cd169
                                            • Instruction Fuzzy Hash: 35B00231199444CFC295DB06C150A2173BCB780B41F5114D5E5028F962CB289D40CA41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 508d827342fb9c54924c299ec58ad6bb2905881a0450e60568b39fffeb4f8248
                                            • Instruction ID: 34334d61769847971a57047772451266c90fc2a63e4117caf10557b15150ae0a
                                            • Opcode Fuzzy Hash: 508d827342fb9c54924c299ec58ad6bb2905881a0450e60568b39fffeb4f8248
                                            • Instruction Fuzzy Hash: DBB0923015D580CFC241CB05C240A6033B8F780A00F6180E5E4064B9118A24D940CE01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2152865518.0000000002AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2ac0000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5bc72c3cadc4bb10c2534361e1a3ea77e35603b1f5884f74d7b5d37b040a1314
                                            • Instruction ID: 5d8e2ea369b8e2fd4ca8c601911afbe0df74c31b485a5cbac114bed1351ab287
                                            • Opcode Fuzzy Hash: 5bc72c3cadc4bb10c2534361e1a3ea77e35603b1f5884f74d7b5d37b040a1314
                                            • Instruction Fuzzy Hash: 18B00135266980CFC296CB0AC294F5073F8FB08A45F4614F0E4058BE62C338A900CA00
                                            APIs
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50), ref: 7E84AD36
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000014), ref: 7E84AD5B
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65FF3C,00000058), ref: 7E84AD7F
                                            • #689.MSVBVM60(?,Options,Show Tips at Startup), ref: 7E84ADB3
                                            • __vbaStrMove.MSVBVM60 ref: 7E84ADC4
                                            • __vbaI4Str.MSVBVM60(00000000), ref: 7E84ADC7
                                            • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 7E84ADD9
                                            • __vbaFreeObj.MSVBVM60 ref: 7E84ADE5
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50), ref: 7E84AE02
                                            • __vbaObjSetAddref.MSVBVM60(?,7E651408), ref: 7E84AE15
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000010), ref: 7E84AE33
                                            • __vbaObjSet.MSVBVM60(?,00000000), ref: 7E84AE4C
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65FF90,000000E4), ref: 7E84AE71
                                            • __vbaFreeObj.MSVBVM60 ref: 7E84AE7A
                                            • #594.MSVBVM60(?), ref: 7E84AE92
                                            • __vbaFreeVar.MSVBVM60 ref: 7E84AE9B
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50), ref: 7E84AEB4
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000014), ref: 7E84AED9
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65FF3C,00000050), ref: 7E84AEFD
                                            • __vbaStrCat.MSVBVM60(7E65F66C,?), ref: 7E84AF12
                                            • __vbaStrMove.MSVBVM60 ref: 7E84AF19
                                            • __vbaStrCat.MSVBVM60(TIPOFDAY.TXT,00000000), ref: 7E84AF21
                                            • __vbaStrMove.MSVBVM60 ref: 7E84AF28
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,7E651408,7E65FE6C,000006F8), ref: 7E84AF4B
                                            • __vbaFreeStrList.MSVBVM60(00000003,?,?,?), ref: 7E84AF6D
                                            • __vbaFreeObj.MSVBVM60 ref: 7E84AF79
                                            • __vbaObjSet.MSVBVM60(?,00000000), ref: 7E84AF98
                                            • __vbaStrCat.MSVBVM60(TIPOFDAY.TXT,That the ), ref: 7E84AFAD
                                            • __vbaStrMove.MSVBVM60 ref: 7E84AFB4
                                            • __vbaStrCat.MSVBVM60( file was not found? ,00000000), ref: 7E84AFBC
                                            • __vbaStrMove.MSVBVM60 ref: 7E84AFC3
                                            • __vbaStrCat.MSVBVM60(7E65FFEC,00000000), ref: 7E84AFCB
                                            • __vbaStrMove.MSVBVM60 ref: 7E84AFD2
                                            • __vbaStrCat.MSVBVM60(7E65FFEC,00000000), ref: 7E84AFDA
                                            • __vbaStrMove.MSVBVM60 ref: 7E84AFE1
                                            • __vbaStrCat.MSVBVM60(Create a text file named ,00000000), ref: 7E84AFE9
                                            • __vbaStrMove.MSVBVM60 ref: 7E84AFF0
                                            • __vbaStrCat.MSVBVM60(TIPOFDAY.TXT,00000000), ref: 7E84AFF8
                                            • __vbaStrMove.MSVBVM60 ref: 7E84AFFF
                                            • __vbaStrCat.MSVBVM60( using NotePad with 1 tip per line. ,00000000), ref: 7E84B007
                                            • __vbaStrMove.MSVBVM60 ref: 7E84B00E
                                            • __vbaStrCat.MSVBVM60(Then place it in the same directory as the application. ,00000000), ref: 7E84B016
                                            • __vbaStrMove.MSVBVM60 ref: 7E84B01D
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E6600F4,00000054), ref: 7E84B036
                                            • __vbaFreeStrList.MSVBVM60(00000008,?,?,?,?,?,?,?,?), ref: 7E84B05E
                                            • __vbaFreeObj.MSVBVM60 ref: 7E84B06A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$Move$CheckFreeHresult$ListNew2$#594#689Addref
                                            • String ID: file was not found? $ using NotePad with 1 tip per line. $;$Create a text file named $Options$Show Tips at Startup$TIPOFDAY.TXT$That the $Then place it in the same directory as the application.
                                            • API String ID: 1089064309-813212176
                                            • Opcode ID: 29cdd0edc1f867a13a686bb22124873bf3900294c7fee59c648bed5df919c947
                                            • Instruction ID: 734ee41dbce21cd69458a8e5a7978560185a3ef271fd0f385d7cbe84fdcd4d00
                                            • Opcode Fuzzy Hash: 29cdd0edc1f867a13a686bb22124873bf3900294c7fee59c648bed5df919c947
                                            • Instruction Fuzzy Hash: 90C13EB5A00218ABDB15EFA5CC48EDEBBB9FF58201F10815AF555EB390DB705905CBA0
                                            APIs
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50), ref: 7E843E02
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000014), ref: 7E843E27
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65FF3C,00000060), ref: 7E843E4B
                                            • __vbaStrCat.MSVBVM60(?,Info zu ), ref: 7E843E5C
                                            • __vbaStrMove.MSVBVM60 ref: 7E843E6D
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,7E6511C0,7E6601EC,00000054), ref: 7E843E89
                                            • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 7E843E9D
                                            • __vbaFreeObj.MSVBVM60 ref: 7E843EA9
                                            • __vbaObjSet.MSVBVM60(?,00000000), ref: 7E843EBD
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50), ref: 7E843EDC
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000014), ref: 7E843F01
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65FF3C,000000B8), ref: 7E843F27
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50), ref: 7E843F3C
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000014), ref: 7E843F61
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65FF3C,000000C0), ref: 7E843F87
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50), ref: 7E843F9C
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000014), ref: 7E843FC1
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65FF3C,000000C8), ref: 7E843FE7
                                            • __vbaStrI2.MSVBVM60(?,Version ), ref: 7E844000
                                            • __vbaStrMove.MSVBVM60 ref: 7E844007
                                            • __vbaStrCat.MSVBVM60(00000000), ref: 7E84400A
                                            • __vbaStrMove.MSVBVM60 ref: 7E844015
                                            • __vbaStrCat.MSVBVM60(7E6602D4,00000000), ref: 7E84401D
                                            • __vbaStrMove.MSVBVM60 ref: 7E844028
                                            • __vbaStrI2.MSVBVM60(?,00000000), ref: 7E84402F
                                            • __vbaStrMove.MSVBVM60 ref: 7E844036
                                            • __vbaStrCat.MSVBVM60(00000000), ref: 7E844039
                                            • __vbaStrMove.MSVBVM60 ref: 7E844044
                                            • __vbaStrCat.MSVBVM60(7E6602D4,00000000), ref: 7E84404C
                                            • __vbaStrMove.MSVBVM60 ref: 7E844057
                                            • __vbaStrI2.MSVBVM60(?,00000000), ref: 7E84405E
                                            • __vbaStrMove.MSVBVM60 ref: 7E844065
                                            • __vbaStrCat.MSVBVM60(00000000), ref: 7E844068
                                            • __vbaStrMove.MSVBVM60 ref: 7E844073
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E6600F4,00000054), ref: 7E844095
                                            • __vbaFreeStrList.MSVBVM60(00000008,?,?,?,?,?,?,?,?), ref: 7E8440C1
                                            • __vbaFreeObjList.MSVBVM60(00000004,?,?,?,?), ref: 7E8440D9
                                            • __vbaObjSet.MSVBVM60(?,00000000), ref: 7E8440F3
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50), ref: 7E84410E
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000014), ref: 7E844133
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65FF3C,00000060), ref: 7E844153
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E6600F4,00000054), ref: 7E84416E
                                            • __vbaFreeStr.MSVBVM60 ref: 7E844173
                                            • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 7E844183
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$CheckHresult$Move$Free$New2$List
                                            • String ID: 7$Info zu $Version
                                            • API String ID: 386842864-2038211018
                                            • Opcode ID: c229a4df403f702de2e2512c5d621157c007f22678581d4a3941eadb1a9b5415
                                            • Instruction ID: 3fc7bb042377dbf3f15869f9f48ddef8e1dc33ff390391f507ad0aae60d43cf0
                                            • Opcode Fuzzy Hash: c229a4df403f702de2e2512c5d621157c007f22678581d4a3941eadb1a9b5415
                                            • Instruction Fuzzy Hash: A5D13BB5A00219AFDB11EFA9CC88E9FBBBDFF59604F104119F505E7390DB70A9058BA0
                                            APIs
                                            • __vbaStrCat.MSVBVM60(7E65F83C,7E65F82C), ref: 7E844540
                                            • __vbaStrMove.MSVBVM60 ref: 7E84454D
                                            • __vbaStrCat.MSVBVM60(7E65F854,00000000), ref: 7E844555
                                            • __vbaStrMove.MSVBVM60 ref: 7E84455C
                                            • __vbaStrCat.MSVBVM60(7E65F878,00000000), ref: 7E844564
                                            • __vbaStrMove.MSVBVM60 ref: 7E84456B
                                            • __vbaStrCat.MSVBVM60(7E65F8AC,00000000), ref: 7E844573
                                            • __vbaStrMove.MSVBVM60 ref: 7E84457A
                                            • __vbaStrCat.MSVBVM60(7E65F8C8,00000000), ref: 7E844582
                                            • __vbaStrMove.MSVBVM60 ref: 7E844589
                                            • __vbaStrCat.MSVBVM60(7E65F8F4,00000000), ref: 7E844591
                                            • __vbaStrMove.MSVBVM60 ref: 7E844598
                                            • __vbaStrCat.MSVBVM60(7E65F910,00000000), ref: 7E8445A0
                                            • __vbaStrMove.MSVBVM60 ref: 7E8445A7
                                            • __vbaStrCat.MSVBVM60(7E65F93C,00000000), ref: 7E8445AF
                                            • __vbaStrMove.MSVBVM60 ref: 7E8445B6
                                            • __vbaStrCat.MSVBVM60(7E65F960,00000000), ref: 7E8445BE
                                            • __vbaStrMove.MSVBVM60 ref: 7E8445C5
                                            • __vbaStrCat.MSVBVM60(7E65F978,00000000), ref: 7E8445CD
                                              • Part of subcall function 7E84A060: __vbaVarDup.MSVBVM60(6D1FD8B1,6D1EA323), ref: 7E84A0A0
                                              • Part of subcall function 7E84A060: #653.MSVBVM60(?,?), ref: 7E84A0AE
                                              • Part of subcall function 7E84A060: __vbaI4Var.MSVBVM60(?), ref: 7E84A0B8
                                              • Part of subcall function 7E84A060: __vbaFreeVar.MSVBVM60 ref: 7E84A0CE
                                              • Part of subcall function 7E84A060: #632.MSVBVM60(?,?,?,?), ref: 7E84A0FA
                                              • Part of subcall function 7E84A060: __vbaVarCat.MSVBVM60(?,?,?), ref: 7E84A10C
                                              • Part of subcall function 7E84A060: __vbaVarMove.MSVBVM60 ref: 7E84A117
                                              • Part of subcall function 7E84A060: __vbaFreeVarList.MSVBVM60(00000002,00000002,?), ref: 7E84A123
                                              • Part of subcall function 7E84A060: __vbaFreeVar.MSVBVM60(7E84A168), ref: 7E84A161
                                            • __vbaStrVarMove.MSVBVM60(?,?), ref: 7E8445FD
                                            • __vbaStrMove.MSVBVM60 ref: 7E844608
                                            • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,?,?,?,?,?), ref: 7E844630
                                            • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 7E844640
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$Move$Free$List$#632#653
                                            • String ID:
                                            • API String ID: 193477259-0
                                            • Opcode ID: 820dfc5137f1e9296cc0431dce476f3af25695573472387359d007e1d845cad4
                                            • Instruction ID: 76dae97eb71ce4441784bb8ef33d6b7c5bc570b38e177c3afa877737f2e6588c
                                            • Opcode Fuzzy Hash: 820dfc5137f1e9296cc0431dce476f3af25695573472387359d007e1d845cad4
                                            • Instruction Fuzzy Hash: FE51B8B5E10118ABDB15EFA9D844DEEBBB9EF88600F10821AF551A7344DB705905CFA1
                                            APIs
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50), ref: 7E84AA54
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000014), ref: 7E84AA7F
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65FF3C,00000058), ref: 7E84AAA7
                                            • __vbaObjSet.MSVBVM60(?,00000000), ref: 7E84AAB7
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65FF90,000000E0), ref: 7E84AADE
                                            • __vbaStrI2.MSVBVM60(?), ref: 7E84AAE4
                                            • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,Function_00003126), ref: 7E84AAEF
                                            • #690.MSVBVM60(?,Options,Show Tips at Startup,00000000), ref: 7E84AB04
                                            • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 7E84AB14
                                            • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 7E84AB24
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$CheckHresult$FreeList$#690MoveNew2
                                            • String ID: K$Options$Show Tips at Startup
                                            • API String ID: 2513475975-3248163797
                                            • Opcode ID: 9d44576b3ba3a1a8b30d33fb297880a40c68b09e65cfab58c9bfd2657498824e
                                            • Instruction ID: 161ef9326419076ca719d282dad00d08d380b0a2def0f9d5fd3b1dfbf7d6a355
                                            • Opcode Fuzzy Hash: 9d44576b3ba3a1a8b30d33fb297880a40c68b09e65cfab58c9bfd2657498824e
                                            • Instruction Fuzzy Hash: 204171B5A40209AFDB00DFA5CD89EDEBBB9FF09604F104159F905EB380D774A905CBA0
                                            APIs
                                            • #648.MSVBVM60(?), ref: 7E84A841
                                            • __vbaFreeVar.MSVBVM60 ref: 7E84A84D
                                            • __vbaStrCmp.MSVBVM60(7E65F084,00000000), ref: 7E84A864
                                            • #645.MSVBVM60(?,00000000), ref: 7E84A881
                                            • __vbaStrMove.MSVBVM60 ref: 7E84A88C
                                            • __vbaStrCmp.MSVBVM60(7E65F084,00000000), ref: 7E84A898
                                            • __vbaFreeStr.MSVBVM60 ref: 7E84A8A6
                                            • __vbaFreeStr.MSVBVM60(7E84A9BB), ref: 7E84A9B4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$Free$#645#648Move
                                            • String ID:
                                            • API String ID: 2957232524-0
                                            • Opcode ID: 02da39ec9a1237963ad4f7c79d7160b3a1b126f21b15628f9b2158c2a9138730
                                            • Instruction ID: 1971b07c523111f16162194b1aa096e73cdaf45d01caaf06683c5c451842da4e
                                            • Opcode Fuzzy Hash: 02da39ec9a1237963ad4f7c79d7160b3a1b126f21b15628f9b2158c2a9138730
                                            • Instruction Fuzzy Hash: 7F510CB5E01209EFCB10DFA6C988ADDBBB5FF49304F208159E559AB384D7345A05CF91
                                            APIs
                                            • __vbaNew2.MSVBVM60(7E65FF2C,7E65144C), ref: 7E84B136
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65FF1C,00000024), ref: 7E84B157
                                            • __vbaObjSet.MSVBVM60(?,00000000), ref: 7E84B176
                                            • __vbaNew2.MSVBVM60(7E65FF2C,7E65144C), ref: 7E84B18A
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,7E84B3B3,7E65FF1C,0000001C), ref: 7E84B1BC
                                            • __vbaStrVarVal.MSVBVM60(?,?), ref: 7E84B1CC
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E6600F4,00000054), ref: 7E84B1E6
                                            • __vbaFreeStr.MSVBVM60 ref: 7E84B1EF
                                            • __vbaFreeObj.MSVBVM60 ref: 7E84B1F8
                                            • __vbaFreeVar.MSVBVM60 ref: 7E84B201
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$CheckFreeHresult$New2
                                            • String ID:
                                            • API String ID: 4034668929-0
                                            • Opcode ID: 010446097d0156823284373c29feab49c9aaa6bdaad734350ad24ccf88d9dc55
                                            • Instruction ID: 024b23dc7329bb299c78c34d1d6221c5b83c744039d18d91317cf336a4908f98
                                            • Opcode Fuzzy Hash: 010446097d0156823284373c29feab49c9aaa6bdaad734350ad24ccf88d9dc55
                                            • Instruction Fuzzy Hash: CF4138B5A00609ABDB10DFAACD8CE9EBBBDFF46604B108519F951A7390DB7099058B60
                                            APIs
                                            • __vbaVarDup.MSVBVM60(6D1FD8B1,6D1EA323), ref: 7E84A0A0
                                            • #653.MSVBVM60(?,?), ref: 7E84A0AE
                                            • __vbaI4Var.MSVBVM60(?), ref: 7E84A0B8
                                            • __vbaFreeVar.MSVBVM60 ref: 7E84A0CE
                                            • #632.MSVBVM60(?,?,?,?), ref: 7E84A0FA
                                            • __vbaVarCat.MSVBVM60(?,?,?), ref: 7E84A10C
                                            • __vbaVarMove.MSVBVM60 ref: 7E84A117
                                            • __vbaFreeVarList.MSVBVM60(00000002,00000002,?), ref: 7E84A123
                                            • __vbaFreeVar.MSVBVM60(7E84A168), ref: 7E84A161
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$Free$#632#653ListMove
                                            • String ID:
                                            • API String ID: 2983645214-0
                                            • Opcode ID: 09eff88537459b898eb99eb6f731124954ad3a62acc13ad384c343dd324a8e23
                                            • Instruction ID: bd9e17b5cfe671c93658994342950cfbc6a1f52e3d7c58f1e8c8cbac3cbb1680
                                            • Opcode Fuzzy Hash: 09eff88537459b898eb99eb6f731124954ad3a62acc13ad384c343dd324a8e23
                                            • Instruction Fuzzy Hash: C921F5B6D0064DEFDB00DFA5C888ADEBFB8FF08304F104559E406A7244EB706989CB60
                                            APIs
                                            • #593.MSVBVM60(?), ref: 7E84A712
                                            • __vbaNew2.MSVBVM60(7E65FF2C,00000000), ref: 7E84A72E
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,?,7E65FF1C,00000024), ref: 7E84A74F
                                            • __vbaR8IntI4.MSVBVM60 ref: 7E84A761
                                            • __vbaFreeVar.MSVBVM60 ref: 7E84A76D
                                            • __vbaNew2.MSVBVM60(7E65D4B8,7E8B33AC), ref: 7E84A786
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65FE6C,000006FC), ref: 7E84A7AD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$CheckHresultNew2$#593Free
                                            • String ID:
                                            • API String ID: 2147906589-0
                                            • Opcode ID: 68377e583644f49ee31e30c1535bb5ec15b598e399ed4b15d51ba5d0575446f3
                                            • Instruction ID: cafd546c31017276d9df88aa666a95d1c24a68bc751085116766279a95d8c91c
                                            • Opcode Fuzzy Hash: 68377e583644f49ee31e30c1535bb5ec15b598e399ed4b15d51ba5d0575446f3
                                            • Instruction Fuzzy Hash: A721A0B9601609EFCB20DF66DD4CB8A7BB9FF09614F204154F885AB794E7349510CB61
                                            APIs
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50,?,?,?,?,?,?,?,?,Function_00003126), ref: 7E84AC48
                                            • __vbaObjSetAddref.MSVBVM60(?,7E6513F8,?,?,?,?,?,?,?,?,Function_00003126), ref: 7E84AC5E
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000010,?,?,?,?,?,?,?,?,Function_00003126), ref: 7E84AC7B
                                            • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,Function_00003126), ref: 7E84AC84
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$AddrefCheckFreeHresultNew2
                                            • String ID: O
                                            • API String ID: 1649212984-878818188
                                            • Opcode ID: fd2f88450dd29250d0926498eac3d77ce7d0967729cf99c62d182b1cb35996d4
                                            • Instruction ID: 82d12aa5dcb360df630111878e15d308a5fbdb6a45c5628324020ca4f647df63
                                            • Opcode Fuzzy Hash: fd2f88450dd29250d0926498eac3d77ce7d0967729cf99c62d182b1cb35996d4
                                            • Instruction Fuzzy Hash: CD11B679A40608FFC700DF5AC989E9EBBB9FF49614F208169F941EB380D7349841CB90
                                            APIs
                                            • __vbaNew2.MSVBVM60(7E65F658,7E8B3C50,?,?,?,?,?,?,?,?,Function_00003126), ref: 7E843D08
                                            • __vbaObjSetAddref.MSVBVM60(?,7E6511B0,?,?,?,?,?,?,?,?,Function_00003126), ref: 7E843D1E
                                            • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,7E65F648,00000010,?,?,?,?,?,?,?,?,Function_00003126), ref: 7E843D3B
                                            • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,Function_00003126), ref: 7E843D44
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: __vba$AddrefCheckFreeHresultNew2
                                            • String ID: O
                                            • API String ID: 1649212984-878818188
                                            • Opcode ID: c3249558844d2073b866abf27d91f81deecec255ea5cdd0ad24f83d0e3e3154c
                                            • Instruction ID: 89c6bea59b826347d8364eb803ce2347ad48e611fc78c35965e5cc0ca65afd1f
                                            • Opcode Fuzzy Hash: c3249558844d2073b866abf27d91f81deecec255ea5cdd0ad24f83d0e3e3154c
                                            • Instruction Fuzzy Hash: 7911B679A00608FFC701DFA6CD89B9EBBB9FF49614F208129F941A7380C7345905CB90
                                            APIs
                                            • #644.MSVBVM60(?,7E846A00,00000001,6D2CEC2C,00000000,?,?,?,?,?,?,Function_00003126), ref: 7E846C67
                                            • #644.MSVBVM60(00000001,?,?,?,?,?,?,Function_00003126), ref: 7E846C72
                                            • #644.MSVBVM60(00000000,?,?,?,?,?,?,Function_00003126), ref: 7E846C84
                                            • #644.MSVBVM60(-00000004,?,?,?,?,?,?,Function_00003126), ref: 7E846CA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2153353406.000000007E65F000.00000020.00000001.01000000.00000003.sdmp, Offset: 7E650000, based on PE: true
                                            • Associated: 00000000.00000002.2153199809.000000007E650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153279656.000000007E651000.00000020.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153313282.000000007E65E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153788068.000000007E8B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2153860108.000000007E8B8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7e650000_fpY3HP2cnH.jbxd
                                            Similarity
                                            • API ID: #644
                                            • String ID:
                                            • API String ID: 700137900-0
                                            • Opcode ID: ad3fc80313e700f92bb431c9623582f748ce9d7868cfd3bb5a0d6e80f3edeb8b
                                            • Instruction ID: 0bc919f711aea086d710ac8a4fef2c717335c92ee6146f792f6a7031d6b979e5
                                            • Opcode Fuzzy Hash: ad3fc80313e700f92bb431c9623582f748ce9d7868cfd3bb5a0d6e80f3edeb8b
                                            • Instruction Fuzzy Hash: E111C1B5A40208AFCB00DFB9CD44E6ABBFDEB49700B20461AF805E3784D7B59D008B64

                                            Execution Graph

                                            Execution Coverage:8.9%
                                            Dynamic/Decrypted Code Coverage:38.9%
                                            Signature Coverage:8.3%
                                            Total number of Nodes:36
                                            Total number of Limit Nodes:5
                                            execution_graph 25775 69ba908 DuplicateHandle 25776 69ba99e 25775->25776 25754 442000 25755 442006 25754->25755 25757 44201d 25755->25757 25758 443065 25755->25758 25759 4431e5 GetPEB 25758->25759 25760 44330c 25759->25760 25760->25757 25761 1567070 25762 15670b4 CheckRemoteDebuggerPresent 25761->25762 25763 15670f6 25762->25763 25777 445b92 25778 445ba8 NtAllocateVirtualMemory 25777->25778 25779 4453b4 25777->25779 25780 445d53 25778->25780 25779->25778 25781 445373 25782 445375 NtAllocateVirtualMemory 25781->25782 25764 443b0d 25765 443b26 25764->25765 25767 445295 GetPEB 25764->25767 25768 445599 25767->25768 25784 69ba6c0 25785 69ba706 GetCurrentProcess 25784->25785 25787 69ba758 GetCurrentThread 25785->25787 25788 69ba751 25785->25788 25789 69ba78e 25787->25789 25790 69ba795 GetCurrentProcess 25787->25790 25788->25787 25789->25790 25791 69ba7cb 25790->25791 25792 69ba7f3 GetCurrentThreadId 25791->25792 25793 69ba824 25792->25793 25769 443d29 25770 444153 25769->25770 25771 444158 NtDelayExecution 25770->25771 25772 444184 25771->25772 25773 444156 NtDelayExecution 25772->25773 25774 44419a 25772->25774

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 52 1567070-15670f4 CheckRemoteDebuggerPresent 54 15670f6-15670fc 52->54 55 15670fd-1567138 52->55 54->55
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 015670E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4600226433.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1560000_RegAsm.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID: [;ME
                                            • API String ID: 3662101638-1444403609
                                            • Opcode ID: 05de628abad3d9e3aa67c3a398b256fa2fe80858c7254b37bc08579f9b774930
                                            • Instruction ID: b5cfbc0a5a9c51ed16f511b2590940417fbc0d52569978390b2681ed9ae86845
                                            • Opcode Fuzzy Hash: 05de628abad3d9e3aa67c3a398b256fa2fe80858c7254b37bc08579f9b774930
                                            • Instruction Fuzzy Hash: BB2145B2800259CFDB10CF9AD884BEEFBF4AF49320F14841AE459A7340C778A944CFA1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 68 1564a88-1564aee 71 1564af0-1564afb 68->71 72 1564b38-1564b3a 68->72 71->72 73 1564afd-1564b09 71->73 74 1564b3c-1564b55 72->74 75 1564b2c-1564b36 73->75 76 1564b0b-1564b15 73->76 81 1564b57-1564b63 74->81 82 1564ba1-1564ba3 74->82 75->74 77 1564b17 76->77 78 1564b19-1564b28 76->78 77->78 78->78 80 1564b2a 78->80 80->75 81->82 84 1564b65-1564b71 81->84 83 1564ba5-1564bbd 82->83 91 1564c07-1564c09 83->91 92 1564bbf-1564bca 83->92 85 1564b94-1564b9f 84->85 86 1564b73-1564b7d 84->86 85->83 88 1564b81-1564b90 86->88 89 1564b7f 86->89 88->88 90 1564b92 88->90 89->88 90->85 93 1564c0b-1564c23 91->93 92->91 94 1564bcc-1564bd8 92->94 100 1564c25-1564c30 93->100 101 1564c6d-1564c6f 93->101 95 1564bda-1564be4 94->95 96 1564bfb-1564c05 94->96 97 1564be6 95->97 98 1564be8-1564bf7 95->98 96->93 97->98 98->98 102 1564bf9 98->102 100->101 103 1564c32-1564c3e 100->103 104 1564c71-1564ce4 101->104 102->96 105 1564c40-1564c4a 103->105 106 1564c61-1564c6b 103->106 113 1564cea-1564cf8 104->113 107 1564c4e-1564c5d 105->107 108 1564c4c 105->108 106->104 107->107 110 1564c5f 107->110 108->107 110->106 114 1564d01-1564d61 113->114 115 1564cfa-1564d00 113->115 122 1564d63-1564d67 114->122 123 1564d71-1564d75 114->123 115->114 122->123 126 1564d69 122->126 124 1564d77-1564d7b 123->124 125 1564d85-1564d89 123->125 124->125 127 1564d7d 124->127 128 1564d8b-1564d8f 125->128 129 1564d99-1564d9d 125->129 126->123 127->125 128->129 130 1564d91 128->130 131 1564d9f-1564da3 129->131 132 1564dad-1564db1 129->132 130->129 131->132 133 1564da5 131->133 134 1564db3-1564db7 132->134 135 1564dc1-1564dc5 132->135 133->132 134->135 138 1564db9-1564dbc call 1560ab8 134->138 136 1564dc7-1564dcb 135->136 137 1564dd5 135->137 136->137 139 1564dcd-1564dd0 call 1560ab8 136->139 142 1564dd6 137->142 138->135 139->137 142->142
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4600226433.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1560000_RegAsm.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: [;ME$[;ME
                                            • API String ID: 0-4159865865
                                            • Opcode ID: 3776ef2a646bc0c2e2cc8e337ff708ab8f22bf8194b19225817dc505bf634a74
                                            • Instruction ID: 8103af776822e898d2fe77559cfe90c78320e43d7ccfb587d69fcca179806da6
                                            • Opcode Fuzzy Hash: 3776ef2a646bc0c2e2cc8e337ff708ab8f22bf8194b19225817dc505bf634a74
                                            • Instruction Fuzzy Hash: AFB12A70E00209CFEF14CFA9C8957ADBBF6BF88714F148529D815AB394EB749885CB81
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4600226433.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1560000_RegAsm.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dc80e6c1ca36d77ef5b909a8321ecd01f340643e99d1bc767c5ba22a556bf598
                                            • Instruction ID: 3ae83307d85330ca4c1b204bdceafd1002fbb88c8d6a60f0c249121ddbfbada3
                                            • Opcode Fuzzy Hash: dc80e6c1ca36d77ef5b909a8321ecd01f340643e99d1bc767c5ba22a556bf598
                                            • Instruction Fuzzy Hash: 7C53E631D10B5A8ADB51EF68C880599F7B1FF99300F11D79AE4587B221FB70AAD4CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 743 1563e70-1563ed6 746 1563f20-1563f22 743->746 747 1563ed8-1563ee3 743->747 748 1563f24-1563f7c 746->748 747->746 749 1563ee5-1563ef1 747->749 758 1563fc6-1563fc8 748->758 759 1563f7e-1563f89 748->759 750 1563f14-1563f1e 749->750 751 1563ef3-1563efd 749->751 750->748 753 1563f01-1563f10 751->753 754 1563eff 751->754 753->753 755 1563f12 753->755 754->753 755->750 760 1563fca-1563fe2 758->760 759->758 761 1563f8b-1563f97 759->761 768 1563fe4-1563fef 760->768 769 156402c-156402e 760->769 762 1563fba-1563fc4 761->762 763 1563f99-1563fa3 761->763 762->760 765 1563fa7-1563fb6 763->765 766 1563fa5 763->766 765->765 767 1563fb8 765->767 766->765 767->762 768->769 770 1563ff1-1563ffd 768->770 771 1564030-156407e 769->771 772 1564020-156402a 770->772 773 1563fff-1564009 770->773 779 1564084-1564092 771->779 772->771 775 156400d-156401c 773->775 776 156400b 773->776 775->775 777 156401e 775->777 776->775 777->772 780 1564094-156409a 779->780 781 156409b-15640fb 779->781 780->781 788 15640fd-1564101 781->788 789 156410b-156410f 781->789 788->789 790 1564103 788->790 791 1564111-1564115 789->791 792 156411f-1564123 789->792 790->789 791->792 793 1564117-156411a call 1560ab8 791->793 794 1564125-1564129 792->794 795 1564133-1564137 792->795 793->792 794->795 797 156412b-156412e call 1560ab8 794->797 798 1564147-156414b 795->798 799 1564139-156413d 795->799 797->795 800 156414d-1564151 798->800 801 156415b-156415f 798->801 799->798 803 156413f-1564142 call 1560ab8 799->803 800->801 804 1564153 800->804 805 1564161-1564165 801->805 806 156416f 801->806 803->798 804->801 805->806 808 1564167 805->808 809 1564170 806->809 808->806 809->809
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4600226433.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1560000_RegAsm.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: [;ME$[;ME
                                            • API String ID: 0-4159865865
                                            • Opcode ID: 8645c978617ae96586980cd0894bd3cdad6108d444aaf200db578ecf64fb0bb6
                                            • Instruction ID: c6e9b5c0aea554d3de2bd880ed60a4814c8cfc8979e1774e1971fe3ebe019bac
                                            • Opcode Fuzzy Hash: 8645c978617ae96586980cd0894bd3cdad6108d444aaf200db578ecf64fb0bb6
                                            • Instruction Fuzzy Hash: 41917B70E00309DFDF14CFA9C8857AEBBF6BF88714F148129E419AB294EB749845CB91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4600226433.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1560000_RegAsm.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e9c01bf777a8a860cb278d9efefad1dbb77f601688a868ec9617d1b5eda693b9
                                            • Instruction ID: 07eb37d43cb55387d1a46fcb4354c96b6e4e2044f819076f057933f77dfcb238
                                            • Opcode Fuzzy Hash: e9c01bf777a8a860cb278d9efefad1dbb77f601688a868ec9617d1b5eda693b9
                                            • Instruction Fuzzy Hash: 3E332E31D1071A8EDB11EF68C8905ADF7B5FF99300F15C79AD458AB221EB70AAC5CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1387 445373-445897 NtAllocateVirtualMemory
                                            APIs
                                            • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,?,00003000,00000004), ref: 00445895
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4599419545.0000000000442000.00000040.80000000.00040000.00000000.sdmp, Offset: 00442000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_442000_RegAsm.jbxd
                                            Similarity
                                            • API ID: AllocateMemoryVirtual
                                            • String ID:
                                            • API String ID: 2167126740-0
                                            • Opcode ID: 461f2017c842cedaf0df22ee892202376c2aa431922ed03f5d6da0b6b6b90dc6
                                            • Instruction ID: 4402dccb5b4fc3af3cc79e13926bd180780f8553674bae104511bcc9d3ed03d2
                                            • Opcode Fuzzy Hash: 461f2017c842cedaf0df22ee892202376c2aa431922ed03f5d6da0b6b6b90dc6
                                            • Instruction Fuzzy Hash: B3D01265658E05BFFE0DCA848C12FB9222897047A0F3003063723940C1EAE49741A26B
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4601797472.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_69b0000_RegAsm.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3b6dbdb073e41040e2193d9be5768bb20351cdf4b472d578f8155db3771609b3
                                            • Instruction ID: cbeb6f24ce1aab78b6c1b7faee9fb1c10d87b70b8374b96663117a86c113014e
                                            • Opcode Fuzzy Hash: 3b6dbdb073e41040e2193d9be5768bb20351cdf4b472d578f8155db3771609b3
                                            • Instruction Fuzzy Hash: 8B323B30E1075ACBDB14DF65D89459DB7B6FFD9300F20D6AAD40AAB214EB30AD85CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4601797472.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_69b0000_RegAsm.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1958e8a00a897e774b156248b7e0bd4941cdff382d757d604d9613dc37d293ed
                                            • Instruction ID: 666e7a8bdf9dcba2ea09be8ba0478479bd771dae99c15412c844d0554b2ea735
                                            • Opcode Fuzzy Hash: 1958e8a00a897e774b156248b7e0bd4941cdff382d757d604d9613dc37d293ed
                                            • Instruction Fuzzy Hash: A602AC30B012069FDB14DB68E5946AEBBF6FF88300F24856AD406DB795DB35EC42CB80

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 069BA73E
                                            • GetCurrentThread.KERNEL32 ref: 069BA77B
                                            • GetCurrentProcess.KERNEL32 ref: 069BA7B8
                                            • GetCurrentThreadId.KERNEL32 ref: 069BA811
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4601797472.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_69b0000_RegAsm.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID: [;ME
                                            • API String ID: 2063062207-1444403609
                                            • Opcode ID: 17c9aed468566469bdb51d14b0151964c38b7ed63534e21252f059f943c89b4b
                                            • Instruction ID: 96cf5b6a1c2f278ace734737ba696f8b0eec2f66fab0116d914d887a65c70aac
                                            • Opcode Fuzzy Hash: 17c9aed468566469bdb51d14b0151964c38b7ed63534e21252f059f943c89b4b
                                            • Instruction Fuzzy Hash: 105177B0D00749DFDB54CFAAD988BEEBBF1EB48310F208059E009A7760D7749944CB65

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 069BA73E
                                            • GetCurrentThread.KERNEL32 ref: 069BA77B
                                            • GetCurrentProcess.KERNEL32 ref: 069BA7B8
                                            • GetCurrentThreadId.KERNEL32 ref: 069BA811
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4601797472.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_69b0000_RegAsm.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID: [;ME
                                            • API String ID: 2063062207-1444403609
                                            • Opcode ID: 677d3a72d848162cff87bf279072ded9dc8b60224c7afdb970fc1ef212df32e4
                                            • Instruction ID: f9daee9d465e23f0f9099b97f627158e6a53e93fa077490763f20cec58d1b062
                                            • Opcode Fuzzy Hash: 677d3a72d848162cff87bf279072ded9dc8b60224c7afdb970fc1ef212df32e4
                                            • Instruction Fuzzy Hash: 005174B0D00749DFDB54CFAAD988BEEBBF1EB88300F208059E009A7760D774A944CB65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 45 156706b-15670f4 CheckRemoteDebuggerPresent 48 15670f6-15670fc 45->48 49 15670fd-1567138 45->49 48->49
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 015670E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4600226433.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1560000_RegAsm.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID: [;ME
                                            • API String ID: 3662101638-1444403609
                                            • Opcode ID: e5162e1e7448e8a2ebc81d5c72517c1bf92d95d9453b9fb8e458608866a5a92d
                                            • Instruction ID: 94a7baa84da0ea3271bd66e95da13a0bfe9f25522131cafde294aa356c14c35e
                                            • Opcode Fuzzy Hash: e5162e1e7448e8a2ebc81d5c72517c1bf92d95d9453b9fb8e458608866a5a92d
                                            • Instruction Fuzzy Hash: D8213672800259CFDB10CF9AD884BEEBBF4AF49220F14841AE459A7340C778A944CF61

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 58 69ba900-69ba99c DuplicateHandle 59 69ba99e-69ba9a4 58->59 60 69ba9a5-69ba9c2 58->60 59->60
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 069BA98F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4601797472.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_69b0000_RegAsm.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID: [;ME
                                            • API String ID: 3793708945-1444403609
                                            • Opcode ID: 7138145d6298ca745f1be1433ba3573e2b12df071e773b2c51010ee198feb991
                                            • Instruction ID: 3c31dc8e57023c3ec82c73caceb97eec2939ba96a1ae566140c021ff51782527
                                            • Opcode Fuzzy Hash: 7138145d6298ca745f1be1433ba3573e2b12df071e773b2c51010ee198feb991
                                            • Instruction Fuzzy Hash: A721E4B5D00248DFDB10CFAAD984ADEBBF4EB48310F24841AE958A7750D378A954CF65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 63 69ba908-69ba99c DuplicateHandle 64 69ba99e-69ba9a4 63->64 65 69ba9a5-69ba9c2 63->65 64->65
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 069BA98F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4601797472.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_69b0000_RegAsm.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID: [;ME
                                            • API String ID: 3793708945-1444403609
                                            • Opcode ID: 092d2ebc82227bd4d30995d209f8517486378def4ff4996a6abc13e39952d8ae
                                            • Instruction ID: 7a594dc81eac6552d63c1e650780ecaba61b1bef4a31bebbc2793393033399b1
                                            • Opcode Fuzzy Hash: 092d2ebc82227bd4d30995d209f8517486378def4ff4996a6abc13e39952d8ae
                                            • Instruction Fuzzy Hash: FB21E4B5900248EFDB10CFAAD984ADEFBF8EB48310F14841AE918A7310D378A944CF65
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4600022983.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_14fd000_RegAsm.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f5f152305f05de05de488fcc6b6f79358d09759e33b1adeb0b533f301c6f7a58
                                            • Instruction ID: e37aaa45850a58a0ddc44c4539e208576696bdcadcc4d10708c949f044f80cf2
                                            • Opcode Fuzzy Hash: f5f152305f05de05de488fcc6b6f79358d09759e33b1adeb0b533f301c6f7a58
                                            • Instruction Fuzzy Hash: F62107B1A04344EFDB15DF64D9C0B16BB61FB84318F24C56EDA094B366C336D447CA62
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4600022983.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_14fd000_RegAsm.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 53030be91fdec0b49904d580d07fbc410dde8b45ce54dd121bfe46866b4a1b1d
                                            • Instruction ID: bf69cc2f30d0a2eada1449383e1ebffd8375f8832ddcec70ac2b8d47c0c23635
                                            • Opcode Fuzzy Hash: 53030be91fdec0b49904d580d07fbc410dde8b45ce54dd121bfe46866b4a1b1d
                                            • Instruction Fuzzy Hash: 89217C755093809FCB06CF24D990716BF71EB46218F28C5EAD9498F767C33A984ACB62
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4600226433.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1560000_RegAsm.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: [;ME$[;ME
                                            • API String ID: 0-4159865865
                                            • Opcode ID: 69d50b97ff125d79a962fbd8e5b405b80bbddff86b61517073d20c34668f68fc
                                            • Instruction ID: 31f9e12b691efd339a80411dcecae31ac19bcbb49d79cca3ff32d2d6438b464a
                                            • Opcode Fuzzy Hash: 69d50b97ff125d79a962fbd8e5b405b80bbddff86b61517073d20c34668f68fc
                                            • Instruction Fuzzy Hash: D7B13E70E00249CFDF14CFA9C8857EEBBF6BF88714F148529D815AB294EB749885CB91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4601797472.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_69b0000_RegAsm.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b6678f91cca97334598c1bb75aac790383c7b9b93a5791ac281a4bf3ec062326
                                            • Instruction ID: 36248adaba88f4e3215e0889564785e12a2783ea173cf5ddf50263e5fe917d64
                                            • Opcode Fuzzy Hash: b6678f91cca97334598c1bb75aac790383c7b9b93a5791ac281a4bf3ec062326
                                            • Instruction Fuzzy Hash: E3124A30F01219CFDB64DF69D994A9EB7B6BF89300F20956AD40AAB754DB319D81CF80