Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rordendecompra_.exe

Overview

General Information

Sample name:rordendecompra_.exe
Analysis ID:1590213
MD5:038582cff59bd7c92aa1d71b8ac632c7
SHA1:ff4bfdc38ab995019c8685ea4bc63951e5f370ee
SHA256:9b688c5929cea65ae3f69a22b3780fa3f45b434fce94a9ccd39392b8dc7003b5
Tags:AgentTeslaexeuser-Porcupine
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rordendecompra_.exe (PID: 7332 cmdline: "C:\Users\user\Desktop\rordendecompra_.exe" MD5: 038582CFF59BD7C92AA1D71B8AC632C7)
    • RegAsm.exe (PID: 7392 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.fosna.net", "Username": "madamweb@fosna.net", "Password": "=A+N^@~c]~#I"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.rordendecompra_.exe.3e90000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.rordendecompra_.exe.3e90000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.2.rordendecompra_.exe.3e90000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.rordendecompra_.exe.3e90000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x34429:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x3449b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x34525:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x345b7:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x34621:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x34693:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x34729:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x347b9:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.rordendecompra_.exe.3e90000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x31623:$s2: GetPrivateProfileString
                  • 0x30cdb:$s3: get_OSFullName
                  • 0x3234c:$s5: remove_Key
                  • 0x324e3:$s5: remove_Key
                  • 0x3347a:$s6: FtpWebRequest
                  • 0x3440b:$s7: logins
                  • 0x3497d:$s7: logins
                  • 0x376f6:$s7: logins
                  • 0x37740:$s7: logins
                  • 0x39095:$s7: logins
                  • 0x382da:$s9: 1.85 (Hash, version 2, native byte-order)
                  Click to see the 5 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 2.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.fosna.net", "Username": "madamweb@fosna.net", "Password": "=A+N^@~c]~#I"}
                  Source: rordendecompra_.exeVirustotal: Detection: 38%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: rordendecompra_.exeJoe Sandbox ML: detected
                  Source: rordendecompra_.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

                  Networking

                  barindex
                  Source: Yara matchFile source: 0.2.rordendecompra_.exe.3e90000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: rordendecompra_.exeString found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
                  Source: rordendecompra_.exeString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_
                  Source: rordendecompra_.exeString found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
                  Source: rordendecompra_.exeString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
                  Source: rordendecompra_.exeString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
                  Source: RegAsm.exe, 00000002.00000002.4495787414.0000000003096000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.000000000307C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: rordendecompra_.exe, 00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmp, rordendecompra_.exe, 00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmp, rordendecompra_.exe, 00000000.00000003.2071369397.0000000000633000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.000000000307C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: rordendecompra_.exeString found in binary or memory: http://ocsps.ssl.com0?
                  Source: RegAsm.exe, 00000002.00000002.4495787414.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.000000000307C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: rordendecompra_.exeString found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
                  Source: rordendecompra_.exe, 00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmp, rordendecompra_.exe, 00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmp, rordendecompra_.exe, 00000000.00000003.2071369397.0000000000633000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: rordendecompra_.exeString found in binary or memory: https://www.ssl.com/repository0

                  System Summary

                  barindex
                  Source: 0.2.rordendecompra_.exe.3e90000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.rordendecompra_.exe.3e90000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_17192F9B NtAllocateVirtualMemory,NtProtectVirtualMemory,KiUserExceptionDispatcher,ChrCmpIA,KiUserExceptionDispatcher,NtProtectVirtualMemory,0_2_17192F9B
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02162BF2 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02162BF2
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02162BDE NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02162BDE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044383C NtDelayExecution,2_2_0044383C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00446535 NtProtectVirtualMemory,2_2_00446535
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443274 NtCreateThreadEx,NtClose,2_2_00443274
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044637E NtAllocateVirtualMemory,2_2_0044637E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445FC8 NtAllocateVirtualMemory,2_2_00445FC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044650C NtAllocateVirtualMemory,2_2_0044650C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044659F NtProtectVirtualMemory,2_2_0044659F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_02D5A6382_2_02D5A638
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_02D54A802_2_02D54A80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_02D5D8B02_2_02D5D8B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_02D59E802_2_02D59E80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_02D53E682_2_02D53E68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_02D541B02_2_02D541B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_068322E82_2_068322E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_068311402_2_06831140
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_06833A882_2_06833A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_068333A02_2_068333A0
                  Source: rordendecompra_.exeStatic PE information: invalid certificate
                  Source: rordendecompra_.exe, 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameacvm7qw909e.exe vs rordendecompra_.exe
                  Source: rordendecompra_.exe, 00000000.00000002.2073379878.0000000003ECE000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename3905be8d-577f-496a-8d1a-8aa930b08db2.exe4 vs rordendecompra_.exe
                  Source: rordendecompra_.exe, 00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename3905be8d-577f-496a-8d1a-8aa930b08db2.exe4 vs rordendecompra_.exe
                  Source: rordendecompra_.exe, 00000000.00000003.2071369397.0000000000633000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename3905be8d-577f-496a-8d1a-8aa930b08db2.exe4 vs rordendecompra_.exe
                  Source: rordendecompra_.exeBinary or memory string: OriginalFilenameacvm7qw909e.exep vs rordendecompra_.exe
                  Source: rordendecompra_.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: 0.2.rordendecompra_.exe.3e90000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.rordendecompra_.exe.3e90000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                  Source: C:\Users\user\Desktop\rordendecompra_.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\89dad5d484a9f889a3a8dfca823edc3e_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegAsm.exe, 00000002.00000002.4495787414.00000000030B4000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.00000000030C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: rordendecompra_.exeVirustotal: Detection: 38%
                  Source: unknownProcess created: C:\Users\user\Desktop\rordendecompra_.exe "C:\Users\user\Desktop\rordendecompra_.exe"
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: msvbvm60.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: vb6zz.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: vb6de.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: vb6de.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0BE35204-8F91-11CE-9DE3-00AA004BB851}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: rordendecompra_.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: rordendecompra_.exeStatic file information: File size 2562416 > 1048576
                  Source: rordendecompra_.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1fa000
                  Source: rordendecompra_.exeStatic PE information: real checksum: 0x277934 should be: 0x27a551
                  Source: rordendecompra_.exeStatic PE information: section name: XXZ
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_16FC0C90 push dword ptr [edx-32004E4Eh]; retf 0_2_16FC0CAE
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02162A18 push 00000003h; retf 0_2_02162A1F
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02161EAB pushfd ; retf 0_2_02161EAC
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02161EFB push eax; retf 0_2_02161F09
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02163717 push cs; iretd 0_2_02163732
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02164F0A push FFFFFFF5h; ret 0_2_02164F0C
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_0216389B push edi; retf 0_2_021638A7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443CFF push FFFFFFF5h; ret 2_2_00443D01
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044250C push cs; iretd 2_2_00442527
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004459C2 push ds; ret 2_2_004459D1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445297 push esi; iretd 2_2_004452BD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00442690 push edi; retf 2_2_0044269C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0683A7F4 pushad ; ret 2_2_0683BAFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_06836C58 push eax; ret 2_2_06836E06
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0683A762 pushad ; ret 2_2_0683A76A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0683D7B3 push ebp; ret 2_2_0683D7BE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0683B708 push edi; ret 2_2_0683B716
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0683B1A3 push edi; ret 2_2_0683B1AE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0683B12C pushad ; ret 2_2_0683B13E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_06839C80 push esi; ret 2_2_06839C8E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_06837CCB pushad ; iretd 2_2_06837CE9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_06839846 push ebp; ret 2_2_06839847
                  Source: rordendecompra_.exeStatic PE information: section name: XXZ entropy: 7.941526526197675
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: rordendecompra_.exe, 00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmp, rordendecompra_.exe, 00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmp, rordendecompra_.exe, 00000000.00000003.2071369397.0000000000633000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.0000000003096000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.0000000002FE5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2FB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2DB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7400Thread sleep count: 143 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7400Thread sleep time: -143000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                  Source: RegAsm.exe, 00000002.00000002.4495787414.0000000002FE5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegAsm.exe, 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
                  Source: RegAsm.exe, 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: RegAsm.exe, 00000002.00000002.4497080441.000000000636E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllf
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_02D57068 CheckRemoteDebuggerPresent,2_2_02D57068
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_17193551 mov eax, dword ptr fs:[00000030h]0_2_17193551
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02162BF2 mov eax, dword ptr fs:[00000030h]0_2_02162BF2
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02166E72 mov eax, dword ptr fs:[00000030h]0_2_02166E72
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02166EDA mov eax, dword ptr fs:[00000030h]0_2_02166EDA
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_02167056 mov eax, dword ptr fs:[00000030h]0_2_02167056
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_021675AA mov ecx, dword ptr fs:[00000030h]0_2_021675AA
                  Source: C:\Users\user\Desktop\rordendecompra_.exeCode function: 0_2_021631C3 mov eax, dword ptr fs:[00000030h]0_2_021631C3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445C67 mov eax, dword ptr fs:[00000030h]2_2_00445C67
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445CCF mov eax, dword ptr fs:[00000030h]2_2_00445CCF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004460AA mov eax, dword ptr fs:[00000030h]2_2_004460AA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445D4B mov eax, dword ptr fs:[00000030h]2_2_00445D4B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445E4B mov eax, dword ptr fs:[00000030h]2_2_00445E4B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445E56 mov eax, dword ptr fs:[00000030h]2_2_00445E56
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445F82 mov eax, dword ptr fs:[00000030h]2_2_00445F82
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044639F mov ecx, dword ptr fs:[00000030h]2_2_0044639F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445BAE mov eax, dword ptr fs:[00000030h]2_2_00445BAE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\rordendecompra_.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: EF9008Jump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\rordendecompra_.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.rordendecompra_.exe.3e90000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2071369397.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: rordendecompra_.exe PID: 7332, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7392, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 0.2.rordendecompra_.exe.3e90000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4495787414.0000000002FE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2071369397.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: rordendecompra_.exe PID: 7332, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7392, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.rordendecompra_.exe.3e90000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2071369397.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: rordendecompra_.exe PID: 7332, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7392, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  211
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  531
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  25
                  Virtualization/Sandbox Evasion
                  LSASS Memory25
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Disable or Modify Tools
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Data from Local System
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
                  Process Injection
                  NTDS1
                  System Network Configuration Discovery
                  Distributed Component Object ModelInput Capture2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                  Obfuscated Files or Information
                  LSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Software Packing
                  Cached Domain Credentials34
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  rordendecompra_.exe39%VirustotalBrowse
                  rordendecompra_.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0rordendecompra_.exefalse
                        high
                        http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Qrordendecompra_.exefalse
                          high
                          http://crls.ssl.com/ssl.com-rsa-RootCA.crl0rordendecompra_.exefalse
                            high
                            http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0rordendecompra_.exefalse
                              high
                              https://account.dyn.com/rordendecompra_.exe, 00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmp, rordendecompra_.exe, 00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmp, rordendecompra_.exe, 00000000.00000003.2071369397.0000000000633000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                high
                                http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_rordendecompra_.exefalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000002.00000002.4495787414.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.000000000307C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.ssl.com/repository0rordendecompra_.exefalse
                                      high
                                      http://ocsps.ssl.com0?rordendecompra_.exefalse
                                        high
                                        http://ip-api.comRegAsm.exe, 00000002.00000002.4495787414.0000000003096000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4495787414.000000000307C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0rordendecompra_.exefalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            208.95.112.1
                                            ip-api.comUnited States
                                            53334TUT-ASUSfalse
                                            Joe Sandbox version:42.0.0 Malachite
                                            Analysis ID:1590213
                                            Start date and time:2025-01-13 18:31:06 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 6m 53s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:5
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:rordendecompra_.exe
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 89%
                                            • Number of executed functions: 28
                                            • Number of non-executed functions: 23
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                            • Excluded IPs from analysis (whitelisted): 13.107.246.60, 4.175.87.197
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ocsps.ssl.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                            TimeTypeDescription
                                            12:33:08API Interceptor116x Sleep call for process: RegAsm.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            208.95.112.1findme.exeGet hashmaliciousDCRatBrowse
                                            • ip-api.com/line/?fields=hosting
                                            tasAgNgjbJ.exeGet hashmaliciousUnknownBrowse
                                            • ip-api.com/json/?fields=61439
                                            Solara.exeGet hashmaliciousPython Stealer, Exela Stealer, XmrigBrowse
                                            • ip-api.com/json
                                            resembleC2.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                            • ip-api.com/json/?fields=225545
                                            F0DgoRk0p1.exeGet hashmaliciousAgentTeslaBrowse
                                            • ip-api.com/line/?fields=hosting
                                            fpY3HP2cnH.exeGet hashmaliciousAgentTeslaBrowse
                                            • ip-api.com/line/?fields=hosting
                                            4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                                            • ip-api.com/line/?fields=hosting
                                            aik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                                            • ip-api.com/json/
                                            DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            • ip-api.com/line/?fields=hosting
                                            tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                                            • ip-api.com/line/?fields=hosting
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            ip-api.comfindme.exeGet hashmaliciousDCRatBrowse
                                            • 208.95.112.1
                                            tasAgNgjbJ.exeGet hashmaliciousUnknownBrowse
                                            • 208.95.112.1
                                            Solara.exeGet hashmaliciousPython Stealer, Exela Stealer, XmrigBrowse
                                            • 208.95.112.1
                                            resembleC2.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                            • 208.95.112.1
                                            F0DgoRk0p1.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            fpY3HP2cnH.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            aik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                                            • 208.95.112.1
                                            DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            • 208.95.112.1
                                            tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            TUT-ASUSfindme.exeGet hashmaliciousDCRatBrowse
                                            • 208.95.112.1
                                            tasAgNgjbJ.exeGet hashmaliciousUnknownBrowse
                                            • 208.95.112.1
                                            Solara.exeGet hashmaliciousPython Stealer, Exela Stealer, XmrigBrowse
                                            • 208.95.112.1
                                            resembleC2.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                            • 208.95.112.1
                                            F0DgoRk0p1.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            fpY3HP2cnH.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            aik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                                            • 208.95.112.1
                                            DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            • 208.95.112.1
                                            tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\rordendecompra_.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):47
                                            Entropy (8bit):1.168829563685559
                                            Encrypted:false
                                            SSDEEP:3:/lSll2DQi:AoMi
                                            MD5:DAB633BEBCCE13575989DCFA4E2203D6
                                            SHA1:33186D50F04C5B5196C1FCC1FAD17894B35AC6C7
                                            SHA-256:1C00FBA1B82CD386E866547F33E1526B03F59E577449792D99C882DEF05A1D17
                                            SHA-512:EDDBB22D9FC6065B8F5376EC95E316E7569530EFAA9EA9BC641881D763B91084DCCC05BC793E8E29131D20946392A31BD943E8FC632D91EE13ABA7B0CD1C626F
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:........................................user.
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.033138363978891
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.94%
                                            • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • VXD Driver (31/22) 0.00%
                                            File name:rordendecompra_.exe
                                            File size:2'562'416 bytes
                                            MD5:038582cff59bd7c92aa1d71b8ac632c7
                                            SHA1:ff4bfdc38ab995019c8685ea4bc63951e5f370ee
                                            SHA256:9b688c5929cea65ae3f69a22b3780fa3f45b434fce94a9ccd39392b8dc7003b5
                                            SHA512:6e72be1e887a305ae4636b063b9438a0c0cfe667387a235960f57b0853973a23e426508aeef9adc6891e6536a1c3bf2c41b00961f6aad32e0eb2f2b7d2f82a33
                                            SSDEEP:49152:dbdYAm4zEbdYAm4zXbdYAm4zKbdYAm4zFbdYAm4zB3An3AI3AJ3Aa:ddrWdrrdrAdr1drlA3AaAtAa
                                            TLSH:FFC5BEE262828BD3DC3B1F32EA26857012323DCD55D89F7A73CD77284B7029A951E51E
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b.................p"..................."...............................'.....4y'....................................
                                            Icon Hash:71e0d49292c07033
                                            Entrypoint:0x16fa1218
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x16fa0000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:
                                            Time Stamp:0x62C6B19B [Thu Jul 7 10:12:43 2022 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:c8ba23b6b87d52f10b27f48f2f6aa725
                                            Signature Valid:false
                                            Signature Issuer:CN=SSL.com EV Code Signing Intermediate CA RSA R3, O=SSL Corp, L=Houston, S=Texas, C=US
                                            Signature Validation Error:The digital signature of the object did not verify
                                            Error Number:-2146869232
                                            Not Before, Not After
                                            • 11/05/2023 05:36:55 24/04/2026 11:16:53
                                            Subject Chain
                                            • OID.1.3.6.1.4.1.311.60.2.1.3=CA, OID.1.3.6.1.4.1.311.60.2.1.2=British Columbia, OID.2.5.4.15=Private Organization, CN=Shift Technologies Inc., SERIALNUMBER=BC1191266, O=Shift (Shift Technologies Inc.), L=Victoria, S=British Columbia, C=CA
                                            Version:3
                                            Thumbprint MD5:11C502D9A1CA5ABB3AA172147439527F
                                            Thumbprint SHA-1:355FEF4F77C8B4CEEABABACF91834240A8D76435
                                            Thumbprint SHA-256:74AB22CFEFD4D99509F937DD200C2734DB8BBC73EFE97F1805DC8148A7B2A231
                                            Serial:3A9AEC951A144C96B362584F2535C97A
                                            Instruction
                                            push 16FA549Ch
                                            call 00007FCD21338A43h
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            xor byte ptr [eax], al
                                            add byte ptr [eax], al
                                            inc eax
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add ch, bl
                                            sub ebp, dword ptr [edx+1EFC80AAh]
                                            inc ebp
                                            pushfd
                                            aaa
                                            arpl di, sp
                                            adc al, byte ptr [edx+00000095h]
                                            add byte ptr [eax], al
                                            add byte ptr [ecx], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [ecx+65h], dl
                                            jc 00007FCD21338AB3h
                                            pop edi
                                            push edi
                                            jbe 00007FCD21338AB4h
                                            arpl word ptr [eax], ax
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add bh, bh
                                            int3
                                            xor dword ptr [eax], eax
                                            pop es
                                            push esi
                                            fdivr st(0), st(2)
                                            hlt
                                            push ss
                                            mov edx, 30BF4A44h
                                            cmp dword ptr [ecx+7Dh], ebp
                                            hlt
                                            mov dh, byte ptr [esi]
                                            mov bl, 87h
                                            retn C45Ah
                                            xor byte ptr [eax+ecx*2], bh
                                            mov bh, D5h
                                            inc esi
                                            pop ss
                                            adc byte ptr [ecx+4F3A10BAh], FFFFFFADh
                                            xor ebx, dword ptr [ecx-48EE309Ah]
                                            or al, 00h
                                            stosb
                                            add byte ptr [eax-2Dh], ah
                                            xchg eax, ebx
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            cdq
                                            inc eax
                                            add byte ptr [eax], al
                                            cmp dword ptr [eax], eax
                                            add byte ptr [eax], al
                                            add byte ptr [esi], al
                                            add byte ptr [esi+72h], ah
                                            insd
                                            push esp
                                            imul esi, dword ptr [eax+00h], 0001190Dh
                                            inc edx
                                            add byte ptr [edx], ah
                                            add byte ptr [ebx], ah
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x2283f80x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x22b0000x45e8c.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x2700000x1970
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x2280000x16c.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x1f9bf40x1fa00043bb5eb3cfbcf35193298502f3545cd8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            XXZ0x1fb0000x2c3db0x2d000c3e2415ed4b5fee20661e25914a923dbFalse0.9605685763888889data7.941526526197675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x2280000xadc0x100010639f55f3b72ae015a5a50b95a74c48False0.267578125data3.7971487415138774IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x2290000x1f1c0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x22b0000x45e8c0x46000462bfbf9b294c8b8417a34ead002731bFalse0.08893345424107142data3.7739678802887693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x22b1780x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.4574468085106383
                                            RT_ICON0x22b5e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.2568011257035647
                                            RT_ICON0x22c6880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.187448132780083
                                            RT_ICON0x22ec300x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.07970381986566855
                                            RT_GROUP_ICON0x270c580x3edata0.7903225806451613
                                            RT_VERSION0x270c980x1f4dataGermanGermany0.5
                                            DLLImport
                                            KERNEL32.DLLGetProcAddress, RtlMoveMemory, GetModuleHandleW
                                            MSVBVM60.DLL__vbaVarSub, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenVar, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaRefVarAry, __vbaBoolVarNull, _CIsin, __vbaVargVarMove, __vbaVarCmpGt, __vbaChkstk, EVENT_SINK_AddRef, __vbaAryConstruct2, __vbaVarTstEq, DllFunctionCall, __vbaVarOr, __vbaRedimPreserve, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, __vbaNew, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaUbound, __vbaVarCat, __vbaI2Var, _CIlog, __vbaVar2Vec, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaAryLock, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaFpI2, __vbaVarCopy, _CIatan, __vbaStrMove, __vbaCastObj, __vbaStrVarCopy, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeObj, __vbaFreeStr
                                            Language of compilation systemCountry where language is spokenMap
                                            GermanGermany
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 13, 2025 18:32:01.856097937 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:32:01.860951900 CET8049708208.95.112.1192.168.2.5
                                            Jan 13, 2025 18:32:01.861023903 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:32:01.862040043 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:32:01.866833925 CET8049708208.95.112.1192.168.2.5
                                            Jan 13, 2025 18:32:02.348469973 CET8049708208.95.112.1192.168.2.5
                                            Jan 13, 2025 18:32:02.392698050 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:32:41.441329002 CET8049708208.95.112.1192.168.2.5
                                            Jan 13, 2025 18:32:41.441401005 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:33:42.363898993 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:33:42.673995018 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:33:43.283338070 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:33:44.486517906 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:33:46.892803907 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:33:51.705338001 CET4970880192.168.2.5208.95.112.1
                                            Jan 13, 2025 18:34:01.314706087 CET4970880192.168.2.5208.95.112.1
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 13, 2025 18:32:01.842415094 CET6386853192.168.2.51.1.1.1
                                            Jan 13, 2025 18:32:01.850127935 CET53638681.1.1.1192.168.2.5
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jan 13, 2025 18:32:01.842415094 CET192.168.2.51.1.1.10x77aStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jan 13, 2025 18:32:01.850127935 CET1.1.1.1192.168.2.50x77aNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                            • ip-api.com
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.549708208.95.112.1807392C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 13, 2025 18:32:01.862040043 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                            Host: ip-api.com
                                            Connection: Keep-Alive
                                            Jan 13, 2025 18:32:02.348469973 CET175INHTTP/1.1 200 OK
                                            Date: Mon, 13 Jan 2025 17:32:02 GMT
                                            Content-Type: text/plain; charset=utf-8
                                            Content-Length: 6
                                            Access-Control-Allow-Origin: *
                                            X-Ttl: 60
                                            X-Rl: 44
                                            Data Raw: 66 61 6c 73 65 0a
                                            Data Ascii: false


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:12:31:58
                                            Start date:13/01/2025
                                            Path:C:\Users\user\Desktop\rordendecompra_.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\rordendecompra_.exe"
                                            Imagebase:0x16fa0000
                                            File size:2'562'416 bytes
                                            MD5 hash:038582CFF59BD7C92AA1D71B8AC632C7
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2073379878.0000000003E92000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.2057539008.0000000003D91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.2071369397.0000000000633000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.2071369397.0000000000633000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:12:31:59
                                            Start date:13/01/2025
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                            Imagebase:0xc10000
                                            File size:65'440 bytes
                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4494463965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4495787414.0000000002FE5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:19.4%
                                              Dynamic/Decrypted Code Coverage:7.6%
                                              Signature Coverage:9.6%
                                              Total number of Nodes:301
                                              Total number of Limit Nodes:40
                                              execution_graph 2438 16fa1218 #100 2439 16fa1258 2438->2439 2440 17195e3a 18 API calls 2486 171999c2 __vbaChkstk __vbaVarDup #653 __vbaI4Var __vbaFreeVar 2440->2486 2442 17195f41 17 API calls 2443 171999c2 11 API calls 2442->2443 2444 17196024 2443->2444 2491 171972f9 6 API calls 2444->2491 2447 17196321 __vbaObjSetAddref #644 __vbaFreeObj #644 2493 1719366b 2447->2493 2448 171962d7 __vbaAryLock #644 __vbaAryUnlock 2450 1719629c 2448->2450 2450->2447 2450->2448 2451 17196366 __vbaAryLock #644 __vbaAryUnlock #644 2494 1719364e 2451->2494 2453 171963c4 __vbaRedim #644 2495 1719364e 2453->2495 2455 17196414 #644 2496 1719364e 2455->2496 2457 17196448 __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 2458 171964bd __vbaHresultCheckObj 2457->2458 2459 171964de 2457->2459 2460 171964e5 __vbaAryUnlock __vbaFreeStr #644 2458->2460 2459->2460 2463 1719651d 2460->2463 2461 171965a8 #644 2497 1719364e 2461->2497 2462 1719655a __vbaAryLock #644 __vbaAryUnlock 2462->2463 2463->2461 2463->2462 2465 171965d6 #644 2498 1719364e 2465->2498 2467 17196604 #644 2499 1719364e 2467->2499 2469 17196632 #644 2500 1719364e 2469->2500 2471 17196660 #644 2501 1719364e 2471->2501 2473 1719668e VirtualProtect 2474 171966f1 __vbaHresultCheckObj 2473->2474 2477 17196712 2473->2477 2474->2477 2475 171967a4 #644 2502 1719364e 2475->2502 2476 17196756 __vbaAryLock #644 __vbaAryUnlock 2476->2477 2477->2475 2477->2476 2479 171967c6 #644 2503 1719364e 2479->2503 2481 171967dd #644 2482 17196800 2481->2482 2504 17196af4 __vbaChkstk 2482->2504 2484 17196809 __vbaFreeVar 2485 17196892 __vbaAryDestruct 2484->2485 2487 17199a2f 2486->2487 2488 17199aab __vbaFreeVar 2487->2488 2489 17199a43 #632 __vbaVarCat __vbaStrVarMove __vbaStrMove __vbaFreeVarList 2487->2489 2488->2442 2489->2487 2492 17196044 44 API calls 2491->2492 2492->2450 2493->2451 2494->2453 2495->2455 2496->2457 2497->2465 2498->2467 2499->2469 2500->2471 2501->2473 2502->2479 2503->2481 2512 171972e1 __vbaChkstk 2504->2512 2506 17196b2b #644 #644 2513 1719364e 2506->2513 2508 17196b58 #644 2514 1719366b 2508->2514 2510 17196b7e #644 2511 17196ba6 2510->2511 2511->2484 2512->2506 2513->2508 2514->2510 2515 2162bf2 2516 2162c03 2515->2516 2534 21631c3 GetPEB 2516->2534 2518 2162c32 2519 21630b7 2518->2519 2520 21631c3 GetPEB 2518->2520 2521 2162c4d 2520->2521 2521->2519 2522 2162db9 NtCreateSection 2521->2522 2522->2519 2523 2162df0 NtMapViewOfSection 2522->2523 2523->2519 2524 2162e18 2523->2524 2525 2162f7b GetPEB 2524->2525 2529 2162eb6 CreateProcessW 2524->2529 2525->2529 2527 2162fc1 NtGetContextThread 2528 2162fe2 NtReadVirtualMemory 2527->2528 2527->2529 2528->2529 2530 2163008 NtWriteVirtualMemory 2528->2530 2529->2519 2529->2527 2530->2529 2531 216302e NtUnmapViewOfSection NtMapViewOfSection 2530->2531 2531->2529 2532 2163062 NtSetContextThread 2531->2532 2532->2529 2533 2163093 NtResumeThread 2532->2533 2533->2519 2533->2529 2535 21631d8 2534->2535 2535->2518 2536 1719a06d __vbaChkstk 2540 16fa79a8 2536->2540 2541 16fa79b1 2540->2541 2542 171971fe __vbaChkstk 2548 171972e1 __vbaChkstk 2542->2548 2544 17197235 #644 2545 1719724a 2544->2545 2546 17197250 __vbaRedim __vbaAryLock #644 __vbaAryUnlock 2545->2546 2547 171972b5 2545->2547 2546->2547 2548->2544 2549 171973a0 __vbaChkstk 2561 171972e1 __vbaChkstk 2549->2561 2551 171973d8 #644 2552 171973ff 2551->2552 2553 17197412 __vbaSetSystemError __vbaRedim __vbaAryLock #644 __vbaAryUnlock 2552->2553 2562 1719366b 2553->2562 2555 1719748d __vbaAryLock #644 __vbaAryUnlock 2563 1719366b 2555->2563 2557 171974ce 6 API calls 2558 1719752b 2557->2558 2559 1719753a __vbaVarMove __vbaFreeStr 2558->2559 2560 17197582 2559->2560 2561->2551 2562->2555 2563->2557 2564 1719a063 2567 17192f9b 2564->2567 2568 17192fbd 2567->2568 2576 17193551 GetPEB 2568->2576 2570 17192fc7 2571 1719301c NtAllocateVirtualMemory 2570->2571 2572 1719303f NtProtectVirtualMemory 2570->2572 2571->2572 2573 1719303a 2571->2573 2572->2573 2575 1719306a 2572->2575 2574 17193103 NtProtectVirtualMemory 2574->2573 2575->2574 2577 17193563 2576->2577 2577->2570 2578 17197886 __vbaChkstk __vbaObjSetAddref 2579 171978db 2578->2579 2580 17197900 2579->2580 2581 171978e6 __vbaHresultCheckObj 2579->2581 2582 17197917 __vbaObjSetAddref 2580->2582 2621 17197912 6 API calls 2580->2621 2581->2580 2681 1719911c __vbaChkstk __vbaObjSetAddref 2582->2681 2585 1719792d 7 API calls 2586 1719911c 20 API calls 2585->2586 2587 1719797b 6 API calls 2586->2587 2588 171979cb 2587->2588 2589 171979f0 2588->2589 2590 171979d6 __vbaHresultCheckObj 2588->2590 2591 17197a1a __vbaHresultCheckObj 2589->2591 2592 17197a34 2589->2592 2590->2589 2591->2592 2593 17197a78 2592->2593 2594 17197a5e __vbaHresultCheckObj 2592->2594 2595 17197a7f __vbaObjSetAddref 2593->2595 2594->2595 2697 17198fd9 __vbaChkstk __vbaObjSetAddref 2595->2697 2597 17197a91 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref 2598 17198fd9 16 API calls 2597->2598 2599 17197aca __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref 2598->2599 2600 17198fd9 16 API calls 2599->2600 2601 17197b03 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj 2600->2601 2602 17197b42 2601->2602 2603 17197b4d __vbaHresultCheckObj 2602->2603 2604 17197b67 2602->2604 2603->2604 2605 17197bab 2604->2605 2606 17197b91 __vbaHresultCheckObj 2604->2606 2607 17197bef 2605->2607 2608 17197bd5 __vbaHresultCheckObj 2605->2608 2606->2605 2609 17197c30 2607->2609 2610 17197c16 __vbaHresultCheckObj 2607->2610 2608->2607 2611 17197c37 __vbaRedim __vbaAryLock 2609->2611 2610->2611 2612 17197c84 2611->2612 2613 17197ca9 2612->2613 2614 17197c8f __vbaHresultCheckObj 2612->2614 2615 17197cb0 __vbaAryUnlock 2613->2615 2614->2615 2616 17197cc6 2615->2616 2619 17197ce5 2615->2619 2707 171987cd __vbaChkstk __vbaVarVargNofree __vbaStrVarCopy __vbaStrMove 2616->2707 2620 17197d07 2619->2620 2619->2621 2750 171984fe __vbaChkstk 2619->2750 2620->2621 2622 17197d4d 2620->2622 2623 17197d33 __vbaHresultCheckObj 2620->2623 2624 17197ea2 __vbaAryLock #644 __vbaAryUnlock 2622->2624 2626 17197d6b __vbaRedim __vbaAryLock 2622->2626 2623->2622 2625 17197edd 2624->2625 2627 171937c4 23 API calls 2625->2627 2628 17197db8 2626->2628 2629 17197ef3 __vbaObjSet 2627->2629 2630 17197ddd 2628->2630 2631 17197dc3 __vbaHresultCheckObj 2628->2631 2633 17197f26 2629->2633 2634 17197f06 __vbaRedim 2629->2634 2632 17197de4 __vbaAryUnlock 2630->2632 2631->2632 2635 17197dfa 2632->2635 2636 17197e19 2632->2636 2633->2621 2639 17197f52 __vbaAryLock 2633->2639 2634->2633 2637 171987cd 37 API calls 2635->2637 2636->2621 2638 17197e47 __vbaAryLock #644 __vbaAryUnlock 2636->2638 2640 171984fe 30 API calls 2636->2640 2637->2636 2643 17197e82 2638->2643 2641 1719830c 2639->2641 2642 17197f86 2639->2642 2644 17197e3b 2640->2644 2646 17198349 2641->2646 2647 1719832f __vbaHresultCheckObj 2641->2647 2648 17197fc0 2642->2648 2649 17197fa6 __vbaHresultCheckObj 2642->2649 2761 171937c4 __vbaChkstk 2643->2761 2644->2621 2644->2638 2652 171983eb __vbaAryUnlock 2646->2652 2653 1719835d __vbaRedim __vbaAryLock 2646->2653 2647->2646 2651 17197fc7 7 API calls 2648->2651 2649->2651 2650 17197e98 __vbaObjSet 2650->2624 2654 17198038 2651->2654 2652->2621 2657 171983b6 2653->2657 2655 1719805d 2654->2655 2656 17198043 __vbaHresultCheckObj 2654->2656 2661 1719809e 2655->2661 2662 17198084 __vbaHresultCheckObj 2655->2662 2656->2655 2658 171983db 2657->2658 2659 171983c1 __vbaHresultCheckObj 2657->2659 2660 171983e2 __vbaAryUnlock 2658->2660 2659->2660 2660->2652 2663 171980a5 7 API calls 2661->2663 2662->2663 2664 1719811a 2663->2664 2665 1719813f 2664->2665 2666 17198125 __vbaHresultCheckObj 2664->2666 2667 17198180 2665->2667 2668 17198166 __vbaHresultCheckObj 2665->2668 2666->2665 2669 17198187 7 API calls 2667->2669 2668->2669 2670 171981fc 2669->2670 2671 17198221 2670->2671 2672 17198207 __vbaHresultCheckObj 2670->2672 2673 1719824b __vbaHresultCheckObj 2671->2673 2674 17198265 2671->2674 2672->2671 2673->2674 2675 17198279 __vbaRedim __vbaAryLock 2674->2675 2676 17198307 2674->2676 2677 171982d2 2675->2677 2676->2652 2678 171982dd __vbaHresultCheckObj 2677->2678 2679 171982f7 2677->2679 2680 171982fe __vbaAryUnlock 2678->2680 2679->2680 2680->2676 2773 1719201d 2681->2773 2683 1719915b __vbaVarMove 2684 1719918f 2683->2684 2685 1719919a __vbaHresultCheckObj 2684->2685 2686 171991b4 2684->2686 2687 171991bb __vbaVarCmpGt __vbaVarOr __vbaBoolVarNull __vbaFreeVar 2685->2687 2686->2687 2688 17199221 __vbaRedim __vbaAryLock 2687->2688 2689 1719921c __vbaFreeObj 2687->2689 2691 17199272 2688->2691 2689->2585 2692 1719927d __vbaHresultCheckObj 2691->2692 2693 17199297 2691->2693 2694 1719929e __vbaAryUnlock 2692->2694 2693->2694 2775 17199324 __vbaChkstk 2694->2775 2698 17199028 2697->2698 2699 17199033 __vbaHresultCheckObj 2698->2699 2701 1719904a 2698->2701 2699->2701 2700 1719905d __vbaFreeObj 2700->2597 2701->2700 2779 17198f0f 7 API calls 2701->2779 2705 171990b7 2705->2700 2706 171990c2 __vbaHresultCheckObj 2705->2706 2706->2700 2708 17198822 2707->2708 2709 1719883a __vbaNew2 2708->2709 2710 17198850 2708->2710 2709->2710 2711 17198878 __vbaHresultCheckObj 2710->2711 2712 1719888f 2710->2712 2713 17198893 __vbaStrToAnsi 2711->2713 2712->2713 2781 16fa77c0 2713->2781 2715 171988af __vbaSetSystemError __vbaFreeStrList 2716 17198af5 2715->2716 2717 171988e4 2715->2717 2720 17198b0a __vbaSetSystemError __vbaLenBstr __vbaStrToAnsi 2716->2720 2718 171988ea __vbaNew2 2717->2718 2719 17198900 2717->2719 2718->2719 2723 17198928 __vbaHresultCheckObj 2719->2723 2724 1719893f 2719->2724 2721 16fa7928 2720->2721 2722 17198b2f __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr 2721->2722 2725 16fa7634 2722->2725 2726 17198943 __vbaStrToAnsi 2723->2726 2724->2726 2727 17198b70 __vbaSetSystemError __vbaAryLock 2725->2727 2728 16fa77c0 2726->2728 2729 16fa76b4 2727->2729 2730 1719895f __vbaSetSystemError __vbaFreeStrList 2728->2730 2731 17198ba9 __vbaSetSystemError __vbaAryUnlock __vbaRedimPreserve 2729->2731 2730->2716 2732 17198994 2730->2732 2749 17198af0 __vbaFreeObj __vbaFreeStr 2731->2749 2733 1719899a __vbaNew2 2732->2733 2734 171989b0 2732->2734 2733->2734 2736 171989d8 __vbaHresultCheckObj 2734->2736 2737 171989ef 2734->2737 2738 171989f3 __vbaStrToAnsi 2736->2738 2737->2738 2739 16fa77c0 2738->2739 2740 17198a0f __vbaSetSystemError __vbaFreeStrList 2739->2740 2740->2716 2741 17198a44 2740->2741 2742 17198a4a __vbaNew2 2741->2742 2743 17198a60 2741->2743 2742->2743 2744 17198a88 __vbaHresultCheckObj 2743->2744 2745 17198a9f 2743->2745 2746 17198aa3 __vbaStrToAnsi 2744->2746 2745->2746 2747 16fa77c0 2746->2747 2748 17198abf __vbaSetSystemError __vbaFreeStrList 2747->2748 2748->2716 2748->2749 2749->2619 2751 1719853e 2750->2751 2752 171985c0 __vbaAryLock #644 __vbaAryUnlock #644 2750->2752 2783 1719847c __vbaChkstk __vbaRefVarAry __vbaUbound __vbaVarMove 2751->2783 2754 16fa78a8 2752->2754 2756 17198608 __vbaRedim __vbaAryLock __vbaAryLock 2754->2756 2757 17198674 __vbaSetSystemError __vbaAryUnlock __vbaAryUnlock __vbaVarMove __vbaVarTstEq 2754->2757 2756->2754 2757->2756 2758 171986da 7 API calls 2757->2758 2759 1719876f 2758->2759 2760 171987a4 __vbaFreeVar __vbaAryDestruct 2759->2760 2760->2620 2785 171938f2 __vbaChkstk 2761->2785 2764 1719383d #644 2791 1719364e 2764->2791 2766 1719383f 2766->2650 2768 1719385b #644 2792 1719364e 2768->2792 2770 17193875 #644 2793 1719364e 2770->2793 2772 17193893 #644 #644 2772->2766 2774 17192022 2773->2774 2774->2683 2776 17199361 2775->2776 2777 171992b3 __vbaVarMove 2776->2777 2778 171993a0 #698 __vbaVarCat __vbaStrVarMove __vbaStrMove __vbaFreeVarList 2776->2778 2777->2689 2778->2776 2780 17198fba __vbaStrVarMove __vbaStrMove __vbaFreeVar #644 2779->2780 2780->2705 2782 16fa77c9 2781->2782 2784 171984df __vbaVarAdd __vbaVarSub __vbaI4Var __vbaFreeVarList 2783->2784 2784->2752 2786 1719394f __vbaVarVargNofree __vbaVarAdd __vbaVarSub __vbaI4Var __vbaFreeVar 2785->2786 2787 1719392f __vbaRedim 2785->2787 2788 171939c1 8 API calls 2786->2788 2787->2786 2790 1719380d __vbaI4Var __vbaFreeVarList 2788->2790 2790->2764 2790->2766 2791->2768 2792->2770 2793->2772

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 294 2162bf2-2162bfd 295 2162c03-2162c38 call 21631c3 294->295 296 2162bfe call 21630c0 294->296 299 21630b7-21630bd 295->299 300 2162c3e-2162c54 call 21631c3 295->300 296->295 300->299 303 2162c5a-2162d47 call 2163114 * 12 300->303 303->299 328 2162d4d-2162d50 303->328 328->299 329 2162d56-2162d59 328->329 329->299 330 2162d5f-2162d62 329->330 330->299 331 2162d68-2162d6b 330->331 331->299 332 2162d71-2162d74 331->332 332->299 333 2162d7a-2162d7d 332->333 333->299 334 2162d83-2162d86 333->334 334->299 335 2162d8c-2162d8f 334->335 335->299 336 2162d95-2162d98 335->336 336->299 337 2162d9e-2162da0 336->337 337->299 338 2162da6-2162db4 337->338 339 2162db6 338->339 340 2162db9-2162dea NtCreateSection 338->340 339->340 340->299 341 2162df0-2162e12 NtMapViewOfSection 340->341 341->299 342 2162e18-2162e4e call 21631a4 341->342 345 2162e86-2162eb0 call 2163201 call 21631a4 342->345 346 2162e50-2162e56 342->346 357 2162eb6-2162f2d 345->357 358 2162f7b-2162f87 GetPEB 345->358 348 2162e5b-2162e5f 346->348 350 2162e77-2162e84 348->350 351 2162e61-2162e74 call 21631a4 348->351 350->345 352 2162e58 350->352 351->350 352->348 362 2162f2f-2162f3f 357->362 359 2162f8a-2162f91 358->359 361 2162f9e-2162fbb CreateProcessW 359->361 361->299 363 2162fc1-2162fdc NtGetContextThread 361->363 362->362 364 2162f41-2162f44 362->364 365 2162fe2-2163002 NtReadVirtualMemory 363->365 366 21630a3-21630a6 363->366 367 2162f52-2162f56 364->367 365->366 368 2163008-216302c NtWriteVirtualMemory 365->368 369 21630af-21630b2 366->369 370 21630a8-21630a9 366->370 371 2162f46-2162f51 367->371 372 2162f58 367->372 368->366 373 216302e-2163060 NtUnmapViewOfSection NtMapViewOfSection 368->373 369->361 370->369 371->367 374 2162f65-2162f6a 372->374 375 2163062-2163091 NtSetContextThread 373->375 376 21630a0 373->376 377 2162f6c-2162f79 374->377 378 2162f5a-2162f64 374->378 375->376 379 2163093-216309e NtResumeThread 375->379 376->366 377->359 378->374 379->299 379->376
                                              APIs
                                              • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 02162DDE
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02162E0B
                                              • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 02162FB6
                                              • NtGetContextThread.NTDLL(?,?), ref: 02162FD5
                                              • NtReadVirtualMemory.NTDLL(?,?,?,000001D8,?), ref: 02162FFB
                                              • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 02163025
                                              • NtUnmapViewOfSection.NTDLL(?,?), ref: 02163040
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02163059
                                              • NtSetContextThread.NTDLL(?,00010003), ref: 0216308A
                                              • NtResumeThread.NTDLL(?,00000000), ref: 02163097
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073262366.0000000002160000.00000040.00001000.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2160000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: Section$ThreadView$ContextCreateMemoryVirtual$ProcessReadResumeUnmapWrite
                                              • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                              • API String ID: 1951729442-1087957892
                                              • Opcode ID: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                                              • Instruction ID: 68b40c4fa309ddb6cc57953d8640641e8726fe68a9861ba6975aa42073485475
                                              • Opcode Fuzzy Hash: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                                              • Instruction Fuzzy Hash: 92E126B2D40259AFDF10DFA4CC88AEDBBB9FF04B08F1440AAE525A7201D7349A65CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 380 2162bde-2162c38 call 21630c0 call 21631c3 386 21630b7-21630bd 380->386 387 2162c3e-2162c54 call 21631c3 380->387 387->386 390 2162c5a-2162d47 call 2163114 * 12 387->390 390->386 415 2162d4d-2162d50 390->415 415->386 416 2162d56-2162d59 415->416 416->386 417 2162d5f-2162d62 416->417 417->386 418 2162d68-2162d6b 417->418 418->386 419 2162d71-2162d74 418->419 419->386 420 2162d7a-2162d7d 419->420 420->386 421 2162d83-2162d86 420->421 421->386 422 2162d8c-2162d8f 421->422 422->386 423 2162d95-2162d98 422->423 423->386 424 2162d9e-2162da0 423->424 424->386 425 2162da6-2162db4 424->425 426 2162db6 425->426 427 2162db9-2162dea NtCreateSection 425->427 426->427 427->386 428 2162df0-2162e12 NtMapViewOfSection 427->428 428->386 429 2162e18-2162e4e call 21631a4 428->429 432 2162e86-2162eb0 call 2163201 call 21631a4 429->432 433 2162e50-2162e56 429->433 444 2162eb6-2162f2d 432->444 445 2162f7b-2162f87 GetPEB 432->445 435 2162e5b-2162e5f 433->435 437 2162e77-2162e84 435->437 438 2162e61-2162e74 call 21631a4 435->438 437->432 439 2162e58 437->439 438->437 439->435 449 2162f2f-2162f3f 444->449 446 2162f8a-2162f91 445->446 448 2162f9e-2162fbb CreateProcessW 446->448 448->386 450 2162fc1-2162fdc NtGetContextThread 448->450 449->449 451 2162f41-2162f44 449->451 452 2162fe2-2163002 NtReadVirtualMemory 450->452 453 21630a3-21630a6 450->453 454 2162f52-2162f56 451->454 452->453 455 2163008-216302c NtWriteVirtualMemory 452->455 456 21630af-21630b2 453->456 457 21630a8-21630a9 453->457 458 2162f46-2162f51 454->458 459 2162f58 454->459 455->453 460 216302e-2163060 NtUnmapViewOfSection NtMapViewOfSection 455->460 456->448 457->456 458->454 461 2162f65-2162f6a 459->461 462 2163062-2163091 NtSetContextThread 460->462 463 21630a0 460->463 464 2162f6c-2162f79 461->464 465 2162f5a-2162f64 461->465 462->463 466 2163093-216309e NtResumeThread 462->466 463->453 464->446 465->461 466->386 466->463
                                              APIs
                                              • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 02162DDE
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02162E0B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073262366.0000000002160000.00000040.00001000.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2160000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: Section$CreateView
                                              • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                              • API String ID: 1585966358-1087957892
                                              • Opcode ID: abf4be790fc250307d74c238f1d7acb35d85655ebd0ffe93a327740511ff9fb9
                                              • Instruction ID: 544e858f3b36a661e365923d2faa9eb30cf62968a9cbe25d80239a2869cc23a0
                                              • Opcode Fuzzy Hash: abf4be790fc250307d74c238f1d7acb35d85655ebd0ffe93a327740511ff9fb9
                                              • Instruction Fuzzy Hash: ACD115B1D40259AFDF10DFA4CC88AEDBBB9BF04B08F1440AAE525A7201D7349A65CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 477 17192f9b-1719301a call 1719328e call 17193551 call 171932b0 call 171934f2 call 171932b0 call 171934f2 call 171932b0 call 171934f2 494 1719301c-17193038 NtAllocateVirtualMemory 477->494 495 1719303f-17193063 NtProtectVirtualMemory 477->495 494->495 496 1719303a 494->496 497 1719306a-1719306f 495->497 498 17193065 495->498 499 17193162-17193167 496->499 500 17193072-17193075 497->500 498->499 501 1719307b-17193094 call 17191b96 500->501 502 17193103-1719315c NtProtectVirtualMemory 500->502 505 1719309b-171930a6 501->505 506 17193096-17193099 501->506 502->499 508 171930fe 505->508 506->505 507 171930a8-171930ab 506->507 509 171930ad-171930c1 507->509 510 171930c3-171930c6 507->510 508->500 509->508 511 171930c8-171930cb 510->511 512 171930e4-171930e7 510->512 511->512 513 171930cd-171930e2 511->513 512->508 514 171930e9-171930ec 512->514 513->508 514->508 515 171930ee-171930f1 514->515 515->508 516 171930f3-171930fb 515->516 516->508
                                              APIs
                                              • NtAllocateVirtualMemory.NTDLL(000000FF,00000100,00000000,00000100,00003000,00000040,?,NtQueryInformationProcess,17191CFF,?,NtQueryInformationProcess,17191D19,?,NtQueryInformationProcess,17191CE8,NtQueryInformationProcess), ref: 17193032
                                              • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,00000040,171C83C8,?,NtQueryInformationProcess,17191CFF,?,NtQueryInformationProcess,17191D19,?,NtQueryInformationProcess,17191CE8,NtQueryInformationProcess,17191D8A), ref: 1719305D
                                              • NtProtectVirtualMemory.NTDLL(000000FF,1719A0EC,00000005,171C83C8,171C83C8,?,NtQueryInformationProcess,17191CFF,?,NtQueryInformationProcess,17191D19,?,NtQueryInformationProcess,17191CE8,NtQueryInformationProcess,17191D8A), ref: 17193159
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: MemoryVirtual$Protect$Allocate
                                              • String ID: NtQueryInformationProcess
                                              • API String ID: 955180148-2781105232
                                              • Opcode ID: c411959945b7e4a2294a56ec54bf4f922ba086a6c1a013068697352c6a0b3833
                                              • Instruction ID: 899471189f07993440e1c0b784385a96dcf88e19714af70216d2ef69d845ecb8
                                              • Opcode Fuzzy Hash: c411959945b7e4a2294a56ec54bf4f922ba086a6c1a013068697352c6a0b3833
                                              • Instruction Fuzzy Hash: 6E51A37590025AAFDB01CFE8CD41ADEFBBAFB84310F54532AD110A7194D774A642CBA2

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 17195e3a-171962be __vbaChkstk __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaChkstk call 171999c2 __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaFreeVar __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaChkstk call 171999c2 call 171972f9 __vbaI4Var GetModuleHandleW __vbaFreeStrList __vbaFreeVarList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaRedim __vbaNew __vbaObjSet __vbaCastObj __vbaObjSet __vbaObjSetAddref __vbaFreeObjList __vbaObjSetAddref #644 __vbaFreeObj #644 call 1719364e call 1719365d 11 171962cc-171962d5 0->11 12 17196321-171964bb __vbaObjSetAddref #644 __vbaFreeObj #644 call 1719366b __vbaAryLock #644 __vbaAryUnlock #644 call 1719364e __vbaRedim #644 call 1719364e #644 call 1719364e __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 11->12 13 171962d7-1719631f __vbaAryLock #644 __vbaAryUnlock call 1719364e 11->13 25 171964bd-171964dc __vbaHresultCheckObj 12->25 26 171964de 12->26 13->11 27 171964e5-17196541 __vbaAryUnlock __vbaFreeStr #644 call 1719364e call 1719365d 25->27 26->27 32 1719654f-17196558 27->32 33 171965a8-171966ef #644 call 1719364e #644 call 1719364e #644 call 1719364e #644 call 1719364e #644 call 1719364e VirtualProtect 32->33 34 1719655a-171965a6 __vbaAryLock #644 __vbaAryUnlock call 1719364e 32->34 48 171966f1-17196710 __vbaHresultCheckObj 33->48 49 17196712 33->49 34->32 50 17196719-1719673d call 1719365d 48->50 49->50 53 1719674b-17196754 50->53 54 171967a4-1719689d #644 call 1719364e #644 call 1719364e #644 call 1719364e call 17196af4 __vbaFreeVar __vbaAryDestruct 53->54 55 17196756-171967a2 __vbaAryLock #644 __vbaAryUnlock call 1719364e 53->55 55->53
                                              APIs
                                              • __vbaChkstk.MSVBVM60(00000000,Function_00001006,?,?,?,1719A12C,?,?,?,00000000,Function_00001006,?,?,?,1719A0EC), ref: 17195E57
                                              • __vbaStrCat.MSVBVM60(16FA724C,16FA7244,?,?,?,00000000,Function_00001006,?,?,?,1719A12C,?,?,?,00000000,Function_00001006), ref: 17195E73
                                              • __vbaStrMove.MSVBVM60(16FA724C,16FA7244,?,?,?,00000000,Function_00001006,?,?,?,1719A12C,?,?,?,00000000,Function_00001006), ref: 17195E7D
                                              • __vbaStrCat.MSVBVM60(bvm,00000000,16FA724C,16FA7244,?,?,?,00000000,Function_00001006,?,?,?,1719A12C), ref: 17195E88
                                              • __vbaStrMove.MSVBVM60(bvm,00000000,16FA724C,16FA7244,?,?,?,00000000,Function_00001006,?,?,?,1719A12C), ref: 17195E92
                                              • __vbaStrCat.MSVBVM60(16FA7264,00000000,bvm,00000000,16FA724C,16FA7244,?,?,?,00000000,Function_00001006,?,?,?,1719A12C), ref: 17195E9D
                                              • __vbaStrMove.MSVBVM60(16FA7264,00000000,bvm,00000000,16FA724C,16FA7244,?,?,?,00000000,Function_00001006,?,?,?,1719A12C), ref: 17195EA7
                                              • #644.MSVBVM60(00000000,16FA7264,00000000,bvm,00000000,16FA724C,16FA7244,?,?,?,00000000,Function_00001006,?,?,?,1719A12C), ref: 17195EAD
                                              • GetModuleHandleW.KERNEL32(00000000,00000000,16FA7264,00000000,bvm,00000000,16FA724C,16FA7244,?,?,?,00000000,Function_00001006), ref: 17195EB3
                                              • __vbaFreeStrList.MSVBVM60(00000003,?,?,?,00000000,00000000,16FA7264,00000000,bvm,00000000,16FA724C,16FA7244,?,?,?,00000000), ref: 17195ECB
                                              • __vbaStrCat.MSVBVM60(16FA727C,16FA7270), ref: 17195EDD
                                              • __vbaStrMove.MSVBVM60(16FA727C,16FA7270), ref: 17195EE7
                                              • __vbaStrCat.MSVBVM60(16FA7294,00000000,16FA727C,16FA7270), ref: 17195EF2
                                              • __vbaStrMove.MSVBVM60(16FA7294,00000000,16FA727C,16FA7270), ref: 17195EFC
                                              • __vbaStrCat.MSVBVM60(16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195F07
                                              • __vbaStrMove.MSVBVM60(16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195F11
                                              • __vbaStrCat.MSVBVM60(16FA72B8,00000000,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195F1C
                                              • __vbaChkstk.MSVBVM60 ref: 17195F2E
                                                • Part of subcall function 171999C2: __vbaChkstk.MSVBVM60(00000000,Function_00001006,00000000,16FA727C,16FA7270), ref: 171999DE
                                                • Part of subcall function 171999C2: __vbaVarDup.MSVBVM60(?,00000008,?,00000000,Function_00001006,00000000), ref: 171999F6
                                                • Part of subcall function 171999C2: #653.MSVBVM60(?,?,?,00000008,?,00000000,Function_00001006,00000000), ref: 17199A03
                                                • Part of subcall function 171999C2: __vbaI4Var.MSVBVM60(?,?,?,?,00000008,?,00000000,Function_00001006,00000000), ref: 17199A0C
                                                • Part of subcall function 171999C2: __vbaFreeVar.MSVBVM60 ref: 17199A28
                                                • Part of subcall function 171999C2: #632.MSVBVM60(?,?,00000001,00000002), ref: 17199A6D
                                                • Part of subcall function 171999C2: __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00000001,00000002), ref: 17199A7E
                                                • Part of subcall function 171999C2: __vbaStrVarMove.MSVBVM60(00000000,?,?,00000008,?,?,00000001,00000002), ref: 17199A84
                                                • Part of subcall function 171999C2: __vbaStrMove.MSVBVM60(00000000,?,?,00000008,?,?,00000001,00000002), ref: 17199A8E
                                                • Part of subcall function 171999C2: __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?,00000000,?,?,00000008,?,?,00000001,00000002), ref: 17199AA1
                                                • Part of subcall function 171999C2: __vbaFreeVar.MSVBVM60(17199AE4), ref: 17199ADE
                                              • __vbaStrMove.MSVBVM60 ref: 17195F46
                                              • __vbaStrToAnsi.MSVBVM60(?,00000000), ref: 17195F50
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 17195F5C
                                              • __vbaFreeStrList.MSVBVM60(00000005,16FA72A8,00000000,16FA72B8,?,?,00000000,?,00000000), ref: 17195F7C
                                              • __vbaFreeVar.MSVBVM60(16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195F87
                                              • __vbaStrCat.MSVBVM60(16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195F96
                                              • __vbaStrMove.MSVBVM60(16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195FA0
                                              • __vbaStrCat.MSVBVM60(e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195FAB
                                              • __vbaStrMove.MSVBVM60(e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195FB5
                                              • __vbaStrCat.MSVBVM60(%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195FC0
                                              • __vbaStrMove.MSVBVM60(%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195FCA
                                              • __vbaStrCat.MSVBVM60(e%l,00000000,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195FD5
                                              • __vbaStrMove.MSVBVM60(e%l,00000000,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195FDF
                                              • __vbaStrCat.MSVBVM60(%3%2,00000000,e%l,00000000,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195FEA
                                              • __vbaStrMove.MSVBVM60(%3%2,00000000,e%l,00000000,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17195FF4
                                              • __vbaStrCat.MSVBVM60(16FA72D8,00000000,%3%2,00000000,e%l,00000000,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000), ref: 17195FFF
                                              • __vbaChkstk.MSVBVM60 ref: 17196011
                                                • Part of subcall function 171972F9: __vbaChkstk.MSVBVM60(?,Function_00001006,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17197315
                                                • Part of subcall function 171972F9: __vbaVarVargNofree.MSVBVM60(?,00000008,?,?,Function_00001006,00000000), ref: 1719732D
                                                • Part of subcall function 171972F9: __vbaStrVarVal.MSVBVM60(?,00000000,?,00000008,?,?,Function_00001006,00000000), ref: 17197337
                                                • Part of subcall function 171972F9: #644.MSVBVM60(00000000,?,00000000,?,00000008,?,?,Function_00001006,00000000), ref: 1719733D
                                                • Part of subcall function 171972F9: __vbaVarMove.MSVBVM60 ref: 17197352
                                                • Part of subcall function 171972F9: __vbaFreeStr.MSVBVM60 ref: 1719735A
                                              • __vbaI4Var.MSVBVM60(?,?,00000008), ref: 1719604B
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000008), ref: 17196051
                                              • __vbaFreeStrList.MSVBVM60(00000005,16FA72A8,16FA72D0,16FA72D8,00000000,?,00000000,?,?,00000008), ref: 17196071
                                              • __vbaFreeVarList.MSVBVM60(00000003,?,?,?,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 1719608D
                                              • __vbaStrCat.MSVBVM60(16FA731C,16FA7314,?,?,?,?,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000), ref: 1719609F
                                              • __vbaStrMove.MSVBVM60(16FA731C,16FA7314,?,?,?,?,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000), ref: 171960A9
                                              • __vbaStrCat.MSVBVM60(16FA7324,00000000,16FA731C,16FA7314,?,?,?,?,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000), ref: 171960B4
                                              • __vbaStrMove.MSVBVM60(16FA7324,00000000,16FA731C,16FA7314,?,?,?,?,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0,16FA72A8,00000000), ref: 171960BE
                                              • __vbaStrCat.MSVBVM60(16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314,?,?,?,?,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0), ref: 171960C9
                                              • __vbaStrMove.MSVBVM60(16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314,?,?,?,?,%n%,00000000,e%r,00000000,16FA72D8,16FA72D0), ref: 171960D3
                                              • __vbaStrCat.MSVBVM60(16FA7114,00000000,16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314,?,?,?,?,%n%,00000000,e%r,00000000), ref: 171960DE
                                              • __vbaStrMove.MSVBVM60(16FA7114,00000000,16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314,?,?,?,?,%n%,00000000,e%r,00000000), ref: 171960E8
                                              • __vbaStrCat.MSVBVM60(16FA711C,00000000,16FA7114,00000000,16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314,?,?,?,?,%n%,00000000), ref: 171960F3
                                              • __vbaStrMove.MSVBVM60(16FA711C,00000000,16FA7114,00000000,16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314,?,?,?,?,%n%,00000000), ref: 171960FD
                                              • __vbaStrCat.MSVBVM60(16FA7124,00000000,16FA711C,00000000,16FA7114,00000000,16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314), ref: 17196108
                                              • __vbaStrMove.MSVBVM60(16FA7124,00000000,16FA711C,00000000,16FA7114,00000000,16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314), ref: 17196112
                                              • __vbaStrCat.MSVBVM60(16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000,16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314), ref: 1719611D
                                              • __vbaStrMove.MSVBVM60(16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000,16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314), ref: 17196127
                                              • __vbaStrCat.MSVBVM60(16FA7324,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000,16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314), ref: 17196132
                                              • __vbaStrMove.MSVBVM60(16FA7324,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000,16FA710C,00000000,16FA7324,00000000,16FA731C,16FA7314), ref: 1719613C
                                              • __vbaStrCat.MSVBVM60(16FA7134,00000000,16FA7324,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000,16FA710C,00000000,16FA7324,00000000), ref: 17196147
                                              • __vbaStrMove.MSVBVM60(16FA7134,00000000,16FA7324,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000,16FA710C,00000000,16FA7324,00000000), ref: 17196151
                                              • __vbaStrCat.MSVBVM60(16FA710C,00000000,16FA7134,00000000,16FA7324,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000,16FA710C,00000000), ref: 1719615C
                                              • __vbaStrMove.MSVBVM60(16FA710C,00000000,16FA7134,00000000,16FA7324,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000,16FA710C,00000000), ref: 17196166
                                              • __vbaStrCat.MSVBVM60(16FA713C,00000000,16FA710C,00000000,16FA7134,00000000,16FA7324,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000), ref: 17196171
                                              • __vbaStrMove.MSVBVM60(16FA713C,00000000,16FA710C,00000000,16FA7134,00000000,16FA7324,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000), ref: 1719617B
                                              • __vbaStrCat.MSVBVM60(16FA7144,00000000,16FA713C,00000000,16FA710C,00000000,16FA7134,00000000,16FA7324,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000), ref: 17196186
                                              • __vbaStrMove.MSVBVM60(16FA7144,00000000,16FA713C,00000000,16FA710C,00000000,16FA7134,00000000,16FA7324,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000), ref: 17196190
                                              • __vbaStrCat.MSVBVM60(16FA710C,00000000,16FA7144,00000000,16FA713C,00000000,16FA710C,00000000,16FA7134,00000000,16FA7324,00000000,16FA712C,00000000,16FA7124,00000000), ref: 1719619B
                                              • __vbaStrMove.MSVBVM60(16FA710C,00000000,16FA7144,00000000,16FA713C,00000000,16FA710C,00000000,16FA7134,00000000,16FA7324,00000000,16FA712C,00000000,16FA7124,00000000), ref: 171961A5
                                              • __vbaStrToAnsi.MSVBVM60(00000000,00000000,16FA710C,00000000,16FA7144,00000000,16FA713C,00000000,16FA710C,00000000,16FA7134,00000000,16FA7324,00000000,16FA712C,00000000), ref: 171961AF
                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 171961BB
                                              • __vbaFreeStrList.MSVBVM60(0000000E,16FA72A8,16FA72D0,16FA72D8,00000000,?,00000000,?,?,?,?,?,16FA7314,16FA731C,00000000,00000000), ref: 171961FF
                                              • __vbaRedim.MSVBVM60(00000080,00000004,00000000,00000003,00000001,0000000F,00000000,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000,16FA7114,00000000), ref: 1719621A
                                              • __vbaNew.MSVBVM60(16FA7168,16FA7328,?,?,?,?,?,?,?,00000000,16FA712C,00000000,16FA7124,00000000,16FA711C,00000000), ref: 1719622C
                                              • __vbaObjSet.MSVBVM60(16FA7324,00000000,16FA7168,16FA7328,?,?,?,?,?,?,?,00000000,16FA712C,00000000,16FA7124,00000000), ref: 17196236
                                              • __vbaCastObj.MSVBVM60(00000000,16FA7324,00000000,16FA7168,16FA7328,?,?,?,?,?,?,?,00000000,16FA712C,00000000,16FA7124), ref: 1719623C
                                              • __vbaObjSet.MSVBVM60(00000000,00000000,00000000,16FA7324,00000000,16FA7168,16FA7328,?,?,?,?,?,?,?,00000000,16FA712C), ref: 17196246
                                              • __vbaObjSetAddref.MSVBVM60(00000000,00000000,00000000,00000000,16FA7324,00000000,16FA7168,16FA7328,?,?,?,?,?,?,?,00000000), ref: 17196252
                                              • __vbaFreeObjList.MSVBVM60(00000002,16FA7324,00000000,00000000,00000000,00000000,00000000,16FA7324,00000000,16FA7168,16FA7328), ref: 17196261
                                              • __vbaObjSetAddref.MSVBVM60(16FA7324,171C92D0,00000000,16FA7168,16FA7328,?,?,?,?,?,?,?,00000000,16FA712C,00000000,16FA7124), ref: 17196274
                                              • #644.MSVBVM60(00000000,16FA7324,171C92D0,00000000,16FA7168,16FA7328,?,?,?,?,?,?,?,00000000,16FA712C,00000000), ref: 1719627A
                                              • __vbaFreeObj.MSVBVM60(00000000,16FA7324,171C92D0,00000000,16FA7168,16FA7328,?,?,?,?,?,?,?,00000000,16FA712C,00000000), ref: 17196285
                                              • #644.MSVBVM60(16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168,16FA7328,?,?,?,?,?,?,?,00000000,16FA712C), ref: 1719628E
                                              • __vbaAryLock.MSVBVM60(00000000,00000000,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168), ref: 171962DE
                                              • #644.MSVBVM60(?,00000000,00000000,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168), ref: 171962F6
                                              • __vbaAryUnlock.MSVBVM60(00000000,?,00000000,00000000,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168), ref: 17196305
                                              • __vbaObjSetAddref.MSVBVM60(16FA7324,171C92D0,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168), ref: 1719632C
                                              • #644.MSVBVM60(00000000,16FA7324,171C92D0,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168), ref: 17196332
                                              • __vbaFreeObj.MSVBVM60(00000000,16FA7324,171C92D0,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168), ref: 1719633D
                                              • #644.MSVBVM60(171C92CC,00000000,16FA7324,171C92D0,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168), ref: 1719634B
                                              • __vbaAryLock.MSVBVM60(00000000,00000000,?,16FA7294,00000004,171C92CC,00000000,16FA7324,171C92D0,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0), ref: 1719636D
                                              • #644.MSVBVM60(?,00000000,00000000,?,16FA7294,00000004,171C92CC,00000000,16FA7324,171C92D0,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324), ref: 17196384
                                              • __vbaAryUnlock.MSVBVM60(00000000,?,00000000,00000000,?,16FA7294,00000004,171C92CC,00000000,16FA7324,171C92D0,00000000,16FA7294,00000000,16FA7294,00000000), ref: 17196393
                                              • #644.MSVBVM60(?,00000000,?,00000000,00000000,?,16FA7294,00000004,171C92CC,00000000,16FA7324,171C92D0,00000000,16FA7294,00000000,16FA7294), ref: 171963AB
                                              • __vbaRedim.MSVBVM60(00000080,00000004,171C9214,00000003,00000001,00000010,00000000,?,16FA7294,?,00000000,?,00000000,00000000,?,16FA7294), ref: 171963F0
                                              • #644.MSVBVM60(16FA7270,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168), ref: 171963FC
                                              • #644.MSVBVM60(00000040,-0000000C,00000000,16FA7270,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168), ref: 17196425
                                              • __vbaAryLock.MSVBVM60(00000000,?,-0000000C,00000040,-0000000C,00000000,16FA7270,00000000,16FA7294,00000000,16FA7294,00000000,16FA7324,171C92D0,00000000,16FA7168), ref: 17196459
                                              • __vbaStrCat.MSVBVM60(16FA7350,16FA7348,?,00000000,00000000,?,-0000000C,00000040,-0000000C,00000000,16FA7270,00000000,16FA7294,00000000,16FA7294,00000000), ref: 17196481
                                              • __vbaStrMove.MSVBVM60(16FA7350,16FA7348,?,00000000,00000000,?,-0000000C,00000040,-0000000C,00000000,16FA7270,00000000,16FA7294,00000000,16FA7294,00000000), ref: 1719648B
                                              • __vbaI4Str.MSVBVM60(00000000,16FA7350,16FA7348,?,00000000,00000000,?,-0000000C,00000040,-0000000C,00000000,16FA7270,00000000,16FA7294,00000000,16FA7294), ref: 17196491
                                              • VirtualProtect.KERNELBASE(00000000,00000000,00000000,16FA7350,16FA7348,?,00000000,00000000,?,-0000000C,00000040,-0000000C,00000000,16FA7270,00000000,16FA7294), ref: 171964A9
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,171C92D0,16FA7328,0000002C), ref: 171964D1
                                              • __vbaAryUnlock.MSVBVM60(00000000), ref: 171964E9
                                              • __vbaFreeStr.MSVBVM60(00000000), ref: 171964F1
                                              • #644.MSVBVM60(16FA7270,00000000), ref: 171964FA
                                              • __vbaAryLock.MSVBVM60(00000000,00000000,00000000,-0000000C,16FA7270,00000000), ref: 17196564
                                              • #644.MSVBVM60(?,00000000,00000000,00000000,-0000000C,16FA7270,00000000), ref: 1719657C
                                              • __vbaAryUnlock.MSVBVM60(00000000,?,00000000,00000000,00000000,-0000000C,16FA7270,00000000), ref: 1719658B
                                              • #644.MSVBVM60(0424448B,00000000,00000000,-0000000C,16FA7270,00000000), ref: 171965B9
                                              • #644.MSVBVM60(408B008B,?,16FA7290,0424448B,00000000,00000000,-0000000C,16FA7270,00000000), ref: 171965E7
                                              • #644.MSVBVM60(20C4832C,?,16FA728C,408B008B,?,16FA7290,0424448B,00000000,00000000,-0000000C,16FA7270,00000000), ref: 17196615
                                              • #644.MSVBVM60(E02474FF,?,16FA7288,20C4832C,?,16FA728C,408B008B,?,16FA7290,0424448B,00000000,00000000,-0000000C,16FA7270,00000000), ref: 17196643
                                              • #644.MSVBVM60(0000E0FF,?,16FA7284,E02474FF,?,16FA7288,20C4832C,?,16FA728C,408B008B,?,16FA7290,0424448B,00000000,00000000,-0000000C), ref: 17196671
                                              • VirtualProtect.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000040,00000000,?,16FA7280,0000E0FF,?,16FA7284,E02474FF), ref: 171966DD
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,171C92D0,16FA7328,00000020), ref: 17196705
                                              • __vbaAryLock.MSVBVM60(00000000,00000000), ref: 17196760
                                              • #644.MSVBVM60(?,00000000,00000000), ref: 17196778
                                              • __vbaAryUnlock.MSVBVM60(00000000,?,00000000,00000000), ref: 17196787
                                              • #644.MSVBVM60(171C92CC,00000000), ref: 171967AD
                                              • #644.MSVBVM60(0000E0FF,16FA7294,171C92CC,00000000), ref: 171967CC
                                              • #644.MSVBVM60(00000000,00000000,0000E0FF,16FA7294,171C92CC,00000000), ref: 171967EC
                                              • __vbaFreeVar.MSVBVM60(00000000,-00000004,00000000,00000000,00000000,0000E0FF,16FA7294,171C92CC,00000000), ref: 1719680C
                                              • __vbaAryDestruct.MSVBVM60(00000000,00000000,1719689E,00000000,-00000004,00000000,00000000,00000000,0000E0FF,16FA7294,171C92CC,00000000), ref: 17196898
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$Move$#644$Free$List$ChkstkLockUnlock$Addref$AddressAnsiCheckHandleHresultModuleProcProtectRedimVirtual$#632#653CastDestructNofreeVarg
                                              • String ID: %3%2$%n%$@$bvm$e%l$e%r
                                              • API String ID: 2498028126-645868286
                                              • Opcode ID: e2776fb98457be46fdc7b747b9a4618354c422bf207fe5efc05fb049c3858844
                                              • Instruction ID: d51c9d93b02eb97635e4af22cd336760aa6fd880357e2aac79f75c03e4c1e928
                                              • Opcode Fuzzy Hash: e2776fb98457be46fdc7b747b9a4618354c422bf207fe5efc05fb049c3858844
                                              • Instruction Fuzzy Hash: 65520ABAD00218AEDB10DBE4CC45FFEB7BEAF14345F5180A5E505A7290DA34BA49CF61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 68 17197886-171978e4 __vbaChkstk __vbaObjSetAddref 70 17197900 68->70 71 171978e6-171978fe __vbaHresultCheckObj 68->71 72 17197907-17197910 70->72 71->72 73 17197912 72->73 74 17197917-171979d4 __vbaObjSetAddref call 1719911c __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaFreeVar __vbaObjSetAddref call 1719911c __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaFreeVar 72->74 75 17198406-17198466 __vbaAryUnlock __vbaAryDestruct __vbaFreeObj * 2 __vbaAryDestruct __vbaFreeObj 73->75 82 171979f0 74->82 83 171979d6-171979ee __vbaHresultCheckObj 74->83 84 171979f7-17197a18 82->84 83->84 86 17197a1a-17197a32 __vbaHresultCheckObj 84->86 87 17197a34 84->87 88 17197a3b-17197a5c 86->88 87->88 90 17197a78 88->90 91 17197a5e-17197a76 __vbaHresultCheckObj 88->91 92 17197a7f-17197b4b __vbaObjSetAddref call 17198fd9 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref call 17198fd9 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref call 17198fd9 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj 90->92 91->92 100 17197b4d-17197b65 __vbaHresultCheckObj 92->100 101 17197b67 92->101 102 17197b6e-17197b8f 100->102 101->102 104 17197bab 102->104 105 17197b91-17197ba9 __vbaHresultCheckObj 102->105 106 17197bb2-17197bd3 104->106 105->106 108 17197bef 106->108 109 17197bd5-17197bed __vbaHresultCheckObj 106->109 110 17197bf6-17197c14 108->110 109->110 112 17197c30 110->112 113 17197c16-17197c2e __vbaHresultCheckObj 110->113 114 17197c37-17197c8d __vbaRedim __vbaAryLock 112->114 113->114 116 17197ca9 114->116 117 17197c8f-17197ca7 __vbaHresultCheckObj 114->117 118 17197cb0-17197cc4 __vbaAryUnlock 116->118 117->118 119 17197cf1-17197cfc 118->119 120 17197cc6-17197ce0 call 171987cd 118->120 121 17197cfe-17197d02 call 171984fe 119->121 122 17197d13-17197d31 119->122 125 17197ce5-17197cea 120->125 126 17197d07-17197d0c 121->126 130 17197d4d 122->130 131 17197d33-17197d4b __vbaHresultCheckObj 122->131 125->119 128 17197cec 125->128 126->122 129 17197d0e 126->129 128->75 129->75 132 17197d54-17197d58 130->132 131->132 133 17197d5e-17197d65 132->133 134 17197ea2-17197f04 __vbaAryLock #644 __vbaAryUnlock call 1719365d call 171937c4 __vbaObjSet 132->134 133->134 136 17197d6b-17197dc1 __vbaRedim __vbaAryLock 133->136 144 17197f26-17197f4c 134->144 145 17197f06-17197f23 __vbaRedim 134->145 141 17197ddd 136->141 142 17197dc3-17197ddb __vbaHresultCheckObj 136->142 143 17197de4-17197df8 __vbaAryUnlock 141->143 142->143 146 17197dfa-17197e1e call 171987cd 143->146 147 17197e25-17197e30 143->147 152 171983fd-17198401 144->152 153 17197f52-17197f80 __vbaAryLock 144->153 145->144 146->147 159 17197e20 146->159 150 17197e32-17197e40 call 171984fe 147->150 151 17197e47-17197e9d __vbaAryLock #644 __vbaAryUnlock call 1719365d call 171937c4 __vbaObjSet 147->151 150->151 163 17197e42 150->163 151->134 152->75 156 1719830c-1719832d 153->156 157 17197f86-17197fa4 153->157 166 17198349 156->166 167 1719832f-17198347 __vbaHresultCheckObj 156->167 168 17197fc0 157->168 169 17197fa6-17197fbe __vbaHresultCheckObj 157->169 159->75 163->75 171 17198350-17198357 166->171 167->171 172 17197fc7-17198041 __vbaVarDup #606 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeVar #644 168->172 169->172 173 171983eb-171983f3 __vbaAryUnlock 171->173 174 1719835d-171983bf __vbaRedim __vbaAryLock 171->174 176 1719805d 172->176 177 17198043-1719805b __vbaHresultCheckObj 172->177 173->152 180 171983db 174->180 181 171983c1-171983d9 __vbaHresultCheckObj 174->181 179 17198064-17198082 176->179 177->179 184 1719809e 179->184 185 17198084-1719809c __vbaHresultCheckObj 179->185 182 171983e2-171983e6 __vbaAryUnlock 180->182 181->182 182->173 186 171980a5-17198123 __vbaVarDup #606 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeVar #644 184->186 185->186 188 1719813f 186->188 189 17198125-1719813d __vbaHresultCheckObj 186->189 190 17198146-17198164 188->190 189->190 192 17198180 190->192 193 17198166-1719817e __vbaHresultCheckObj 190->193 194 17198187-17198205 __vbaVarDup #606 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeVar #644 192->194 193->194 196 17198221 194->196 197 17198207-1719821f __vbaHresultCheckObj 194->197 198 17198228-17198249 196->198 197->198 200 1719824b-17198263 __vbaHresultCheckObj 198->200 201 17198265 198->201 202 1719826c-17198273 200->202 201->202 203 17198279-171982db __vbaRedim __vbaAryLock 202->203 204 17198307 202->204 206 171982dd-171982f5 __vbaHresultCheckObj 203->206 207 171982f7 203->207 204->173 208 171982fe-17198302 __vbaAryUnlock 206->208 207->208 208->204
                                              APIs
                                              • __vbaChkstk.MSVBVM60(00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000,171C92F4,171C92C4), ref: 171978A3
                                              • __vbaObjSetAddref.MSVBVM60(1719A0EC,?,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000,171C92F4,171C92C4), ref: 171978BC
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,1719A0EC,16FA7B64,0000000C,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000), ref: 171978F3
                                              • __vbaObjSetAddref.MSVBVM60(?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000,171C92F4,171C92C4), ref: 1719791E
                                                • Part of subcall function 1719911C: __vbaChkstk.MSVBVM60(?,Function_00001006), ref: 17199138
                                                • Part of subcall function 1719911C: __vbaObjSetAddref.MSVBVM60(?,?,?,?,?,?,Function_00001006), ref: 17199151
                                                • Part of subcall function 1719911C: __vbaVarMove.MSVBVM60 ref: 17199175
                                                • Part of subcall function 1719911C: __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7B64,0000000C), ref: 171991A7
                                                • Part of subcall function 1719911C: __vbaVarCmpGt.MSVBVM60(?,171C92BC,00008003,0000000B), ref: 171991F3
                                                • Part of subcall function 1719911C: __vbaVarOr.MSVBVM60(?,00000000,?,171C92BC,00008003,0000000B), ref: 171991FD
                                                • Part of subcall function 1719911C: __vbaBoolVarNull.MSVBVM60(00000000,?,00000000,?,171C92BC,00008003,0000000B), ref: 17199203
                                                • Part of subcall function 1719911C: __vbaFreeVar.MSVBVM60(00000000,?,00000000,?,171C92BC,00008003,0000000B), ref: 1719920F
                                                • Part of subcall function 1719911C: __vbaFreeObj.MSVBVM60(17199306,171C9220,00000040,?), ref: 17199300
                                              • __vbaStrVarMove.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?), ref: 17197931
                                              • __vbaStrMove.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?), ref: 1719793B
                                              • __vbaStrCopy.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?), ref: 17197948
                                              • __vbaFreeStr.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?), ref: 17197950
                                              • __vbaFreeObj.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?), ref: 17197958
                                              • __vbaFreeVar.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?), ref: 17197960
                                              • __vbaObjSetAddref.MSVBVM60(?,1719A0EC,?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C), ref: 1719796C
                                                • Part of subcall function 1719911C: __vbaRedim.MSVBVM60(00000080,00000001,171C9220,00000011,00000001,-00000001,00000000,00000000,?,00000000,?,171C92BC,00008003,0000000B), ref: 17199238
                                                • Part of subcall function 1719911C: __vbaAryLock.MSVBVM60(?), ref: 1719924A
                                                • Part of subcall function 1719911C: __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7B64,0000000C), ref: 1719928A
                                                • Part of subcall function 1719911C: __vbaAryUnlock.MSVBVM60(?), ref: 171992A2
                                                • Part of subcall function 1719911C: __vbaVarMove.MSVBVM60(171C9220,00000040,?), ref: 171992C3
                                              • __vbaStrVarMove.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 1719797F
                                              • __vbaStrMove.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 17197989
                                              • __vbaStrCopy.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 17197996
                                              • __vbaFreeStr.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 1719799E
                                              • __vbaFreeObj.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 171979A6
                                              • __vbaFreeVar.MSVBVM60(?,?,00000000,?,1719A0EC,?,?,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 171979AE
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,1719A0EC,16FA7B64,0000000C,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000), ref: 171979E3
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,1719A0EC,16FA7B64,0000000C,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000), ref: 17197A27
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,1719A0EC,16FA7B64,0000000C,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000), ref: 17197A6B
                                              • __vbaObjSetAddref.MSVBVM60(?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000,171C92F4,171C92C4), ref: 17197A86
                                              • __vbaStrMove.MSVBVM60(00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000,171C92F4), ref: 17197A96
                                              • __vbaStrCopy.MSVBVM60(00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000,171C92F4), ref: 17197AA3
                                              • __vbaFreeStr.MSVBVM60(00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000,171C92F4), ref: 17197AAB
                                              • __vbaFreeObj.MSVBVM60(00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000,171C92F4), ref: 17197AB3
                                              • __vbaObjSetAddref.MSVBVM60(?,1719A0EC,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?), ref: 17197ABF
                                              • __vbaStrMove.MSVBVM60(00000000,?,1719A0EC,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000), ref: 17197ACF
                                              • __vbaStrCopy.MSVBVM60(00000000,?,1719A0EC,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000), ref: 17197ADC
                                              • __vbaFreeStr.MSVBVM60(00000000,?,1719A0EC,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000), ref: 17197AE4
                                              • __vbaFreeObj.MSVBVM60(00000000,?,1719A0EC,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000), ref: 17197AEC
                                              • __vbaObjSetAddref.MSVBVM60(?,1719A0EC,00000000,?,1719A0EC,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 17197AF8
                                              • __vbaStrMove.MSVBVM60(00000000,?,1719A0EC,00000000,?,1719A0EC,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 17197B08
                                              • __vbaStrCopy.MSVBVM60(00000000,?,1719A0EC,00000000,?,1719A0EC,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 17197B15
                                              • __vbaFreeStr.MSVBVM60(00000000,?,1719A0EC,00000000,?,1719A0EC,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 17197B1D
                                              • __vbaFreeObj.MSVBVM60(00000000,?,1719A0EC,00000000,?,1719A0EC,00000000,?,1719A0EC,?,?,?,00000000,Function_00001006), ref: 17197B25
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,1719A0EC,16FA7B64,0000000C,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000), ref: 17197B5A
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,1719A0EC,16FA7B64,0000000C,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000), ref: 17197B9E
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,1719A0EC,16FA7B64,0000000C,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000), ref: 17197BE2
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,1719A0EC,16FA7B64,0000000C,?,?,?,00000000,Function_00001006,?,?,?,1719A24C,00000000,?,00000000), ref: 17197C23
                                              • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,17193DC6,00000000,?,?,?,00000000,Function_00001006,?,?,?,1719A24C), ref: 17197C4D
                                              • __vbaAryLock.MSVBVM60(?,?,?,17193DC7), ref: 17197C5C
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7B64,0000000C), ref: 17197C9C
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7B64,0000000C), ref: 17197D40
                                              • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,0FFFFFFF,00000000), ref: 17197D81
                                              • __vbaAryLock.MSVBVM60(?,?), ref: 17197D90
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7B64,0000000C), ref: 17197DD0
                                              • __vbaAryUnlock.MSVBVM60(?), ref: 17197DE8
                                              • __vbaAryUnlock.MSVBVM60(?), ref: 17197CB4
                                                • Part of subcall function 171987CD: __vbaChkstk.MSVBVM60(?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF,?), ref: 171987E8
                                                • Part of subcall function 171987CD: __vbaVarVargNofree.MSVBVM60(?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF,?), ref: 17198800
                                                • Part of subcall function 171987CD: __vbaStrVarCopy.MSVBVM60(00000000,?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF,?), ref: 17198806
                                                • Part of subcall function 171987CD: __vbaStrMove.MSVBVM60(00000000,?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF,?), ref: 17198810
                                                • Part of subcall function 171987CD: __vbaNew2.MSVBVM60(16FA56F4,00000000,00000000,?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF,?), ref: 17198843
                                                • Part of subcall function 171987CD: __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7384,0000001C,?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF), ref: 17198885
                                                • Part of subcall function 171987CD: __vbaStrToAnsi.MSVBVM60(?,00000000,00000018,00000000,?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF), ref: 1719889E
                                                • Part of subcall function 171987CD: __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,00000000,00000018,00000000,?,?,?,?,Function_00001006,?,?,?,17197E19), ref: 171988B2
                                                • Part of subcall function 171987CD: __vbaFreeStrList.MSVBVM60(00000002,00000000,?,?,00000000,00000000,?,00000000,00000018,00000000,?,?,?,?,Function_00001006), ref: 171988D0
                                                • Part of subcall function 171987CD: __vbaNew2.MSVBVM60(16FA56F4,00000000), ref: 171988F3
                                              • __vbaAryUnlock.MSVBVM60(?,17198467,?,00000000,?,?,?,?,?,?,?), ref: 17198433
                                              • __vbaAryDestruct.MSVBVM60(00000000,?,?,17198467,?,00000000,?,?,?,?,?,?,?), ref: 1719843E
                                              • __vbaFreeObj.MSVBVM60(00000000,?,?,17198467,?,00000000,?,?,?,?,?,?,?), ref: 17198446
                                              • __vbaFreeObj.MSVBVM60(00000000,?,?,17198467,?,00000000,?,?,?,?,?,?,?), ref: 1719844E
                                              • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,?,?,17198467,?,00000000,?,?,?,?,?,?,?), ref: 17198459
                                              • __vbaFreeObj.MSVBVM60(00000000,?,00000000,?,?,17198467,?,00000000,?,?,?,?,?,?,?), ref: 17198461
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$Free$CheckHresult$Move$Addref$Copy$Unlock$ChkstkLockRedim$DestructNew2$AnsiBoolErrorListNofreeNullSystemVarg
                                              • String ID:
                                              • API String ID: 734032644-0
                                              • Opcode ID: 77ada37600435c14b0776c34f452c47a9d07eeca87e0afe286bafba08aadfd5c
                                              • Instruction ID: 4ca39a6bd100f0123448f86a828ba880f91df1d622a6761c334c755e808df8d1
                                              • Opcode Fuzzy Hash: 77ada37600435c14b0776c34f452c47a9d07eeca87e0afe286bafba08aadfd5c
                                              • Instruction Fuzzy Hash: 5282CE75E10218AFDF00DBA4DC44FEEBBBABF18351F118169E115AB2A1D734A959CF20

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 209 171987cd-17198820 __vbaChkstk __vbaVarVargNofree __vbaStrVarCopy __vbaStrMove 210 17198822-17198831 call 1719365d 209->210 211 17198834-17198838 209->211 210->211 213 1719883a-1719884e __vbaNew2 211->213 214 17198850-17198853 211->214 216 17198856-17198876 213->216 214->216 218 17198878-1719888d __vbaHresultCheckObj 216->218 219 1719888f 216->219 220 17198893-171988de __vbaStrToAnsi call 16fa77c0 __vbaSetSystemError __vbaFreeStrList 218->220 219->220 223 17198af5-17198ba4 call 16fa7734 __vbaSetSystemError __vbaLenBstr __vbaStrToAnsi call 16fa7928 __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr call 16fa7634 __vbaSetSystemError __vbaAryLock call 16fa76b4 220->223 224 171988e4-171988e8 220->224 241 17198ba9-17198bd4 __vbaSetSystemError __vbaAryUnlock __vbaRedimPreserve 223->241 225 171988ea-171988fe __vbaNew2 224->225 226 17198900-17198903 224->226 228 17198906-17198926 225->228 226->228 233 17198928-1719893d __vbaHresultCheckObj 228->233 234 1719893f 228->234 236 17198943-1719895a __vbaStrToAnsi call 16fa77c0 233->236 234->236 240 1719895f-1719898e __vbaSetSystemError __vbaFreeStrList 236->240 240->223 242 17198994-17198998 240->242 243 17198bd9-17198c0c __vbaFreeObj __vbaFreeStr 241->243 244 1719899a-171989ae __vbaNew2 242->244 245 171989b0-171989b3 242->245 247 171989b6-171989d6 244->247 245->247 249 171989d8-171989ed __vbaHresultCheckObj 247->249 250 171989ef 247->250 251 171989f3-17198a3e __vbaStrToAnsi call 16fa77c0 __vbaSetSystemError __vbaFreeStrList 249->251 250->251 251->223 254 17198a44-17198a48 251->254 255 17198a4a-17198a5e __vbaNew2 254->255 256 17198a60-17198a63 254->256 257 17198a66-17198a86 255->257 256->257 259 17198a88-17198a9d __vbaHresultCheckObj 257->259 260 17198a9f 257->260 261 17198aa3-17198aee __vbaStrToAnsi call 16fa77c0 __vbaSetSystemError __vbaFreeStrList 259->261 260->261 261->223 264 17198af0 261->264 264->243
                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF,?), ref: 171987E8
                                              • __vbaVarVargNofree.MSVBVM60(?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF,?), ref: 17198800
                                              • __vbaStrVarCopy.MSVBVM60(00000000,?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF,?), ref: 17198806
                                              • __vbaStrMove.MSVBVM60(00000000,?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF,?), ref: 17198810
                                              • __vbaNew2.MSVBVM60(16FA56F4,00000000,00000000,?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF,?), ref: 17198843
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7384,0000001C,?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF), ref: 17198885
                                              • __vbaStrToAnsi.MSVBVM60(?,00000000,00000018,00000000,?,?,?,?,Function_00001006,?,?,?,17197E19,?,00004008,000000FF), ref: 1719889E
                                              • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,00000000,00000018,00000000,?,?,?,?,Function_00001006,?,?,?,17197E19), ref: 171988B2
                                              • __vbaFreeStrList.MSVBVM60(00000002,00000000,?,?,00000000,00000000,?,00000000,00000018,00000000,?,?,?,?,Function_00001006), ref: 171988D0
                                              • __vbaNew2.MSVBVM60(16FA56F4,00000000), ref: 171988F3
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7384,0000001C), ref: 17198935
                                              • __vbaStrToAnsi.MSVBVM60(?,?,00000018,00000008), ref: 1719894E
                                              • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,?,00000018,00000008), ref: 17198962
                                              • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,?,?,00000018,00000008), ref: 17198980
                                              • __vbaNew2.MSVBVM60(16FA56F4,00000000), ref: 171989A3
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7384,00000020), ref: 171989E5
                                              • __vbaStrToAnsi.MSVBVM60(?,?,00000018,00000000), ref: 171989FE
                                              • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,?,00000018,00000000), ref: 17198A12
                                              • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,?,?,00000018,00000000), ref: 17198A30
                                              • __vbaNew2.MSVBVM60(16FA56F4,00000000), ref: 17198A53
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7384,00000020), ref: 17198A95
                                              • __vbaStrToAnsi.MSVBVM60(?,?,00000018,00000008), ref: 17198AAE
                                              • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,?,00000018,00000008), ref: 17198AC2
                                              • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,?,?,00000018,00000008), ref: 17198AE0
                                              • __vbaSetSystemError.MSVBVM60(?,00008003,00000000,00000000,?), ref: 17198B0A
                                              • __vbaLenBstr.MSVBVM60(?,00000000,?,00008003,00000000,00000000,?), ref: 17198B14
                                              • __vbaStrToAnsi.MSVBVM60(?,?,00000000,?,00000000,?,00008003,00000000,00000000,?), ref: 17198B21
                                              • __vbaSetSystemError.MSVBVM60(00000000,00000000,?,?,00000000,?,00000000,?,00008003,00000000,00000000,?), ref: 17198B32
                                              • __vbaStrToUnicode.MSVBVM60(?,?,00000000,00000000,?,?,00000000,?,00000000,?,00008003,00000000,00000000,?), ref: 17198B3E
                                              • __vbaFreeStr.MSVBVM60 ref: 17198B55
                                              • __vbaSetSystemError.MSVBVM60(00000000,00006610,00000000,00000000,00000000), ref: 17198B73
                                              • __vbaAryLock.MSVBVM60(?,?,00000000,00006610,00000000,00000000,00000000), ref: 17198B81
                                              • __vbaSetSystemError.MSVBVM60(00000000,00000000,00000001,00000000,?,00000000,?,?,00000000,00006610,00000000,00000000,00000000), ref: 17198BA9
                                              • __vbaAryUnlock.MSVBVM60(?,00000000,00000000,00000001,00000000,?,00000000,?,?,00000000,00006610,00000000,00000000,00000000), ref: 17198BB2
                                              • __vbaRedimPreserve.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000,?,00000000,00000000,00000001,00000000,?,00000000,?,?), ref: 17198BCC
                                              • __vbaFreeObj.MSVBVM60(17198C0D,?,00000000), ref: 17198BFF
                                              • __vbaFreeStr.MSVBVM60(17198C0D,?,00000000), ref: 17198C07
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$ErrorSystem$Free$Ansi$CheckHresultListNew2$BstrChkstkCopyLockMoveNofreePreserveRedimUnicodeUnlockVarg
                                              • String ID:
                                              • API String ID: 1357747868-0
                                              • Opcode ID: cd57090dfca07d0c6fa429f4e0a4b0c489e103a28e820a2144611d2888af9cfd
                                              • Instruction ID: 85d89afd71b2bc617467e55200a763009efc59d73ca21d1883a578ff36235e6e
                                              • Opcode Fuzzy Hash: cd57090dfca07d0c6fa429f4e0a4b0c489e103a28e820a2144611d2888af9cfd
                                              • Instruction Fuzzy Hash: 0FD1E179D40349EEDF11DBE0CD45FEEBBBAAF08741F114026E501AA290D774AA49CB21

                                              Control-flow Graph

                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006,?,?,?,17197E3B,?,?), ref: 1719851B
                                              • __vbaVarAdd.MSVBVM60(?,00000002,?,?,00006011,?,?,?,?,Function_00001006,?,?,?,17197E3B,?,?), ref: 1719858F
                                              • __vbaVarSub.MSVBVM60(?,00000002,00000000,?,00000002,?,?,00006011,?,?,?,?,Function_00001006), ref: 171985A0
                                              • __vbaI4Var.MSVBVM60(00000000,?,00000002,00000000,?,00000002,?,?,00006011,?,?,?,?,Function_00001006), ref: 171985A6
                                              • __vbaFreeVarList.MSVBVM60(00000002,?,?,00000000,?,00000002,00000000,?,00000002,?,?,00006011,?,?,?,?), ref: 171985B8
                                              • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,Function_00001006,?,?,?,17197E3B,?,?), ref: 171985C9
                                              • #644.MSVBVM60(?,?,?,?,?,?,?,Function_00001006,?,?,?,17197E3B,?,?), ref: 171985DF
                                              • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,?,?,Function_00001006,?,?,?,17197E3B,?,?), ref: 171985EE
                                              • #644.MSVBVM60(00000000,?,?,?,?,?,?,?,?,Function_00001006,?,?,?,17197E3B,?,?), ref: 171985F7
                                              • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000,?,00000000,00000000,?,?,?,?), ref: 1719861E
                                              • __vbaAryLock.MSVBVM60(?,?), ref: 1719862F
                                              • __vbaAryLock.MSVBVM60(?,?,?,?), ref: 1719863B
                                              • __vbaSetSystemError.MSVBVM60(00000002,?,?,?,?,?,?,?,?,?), ref: 1719867A
                                              • __vbaAryUnlock.MSVBVM60(?,00000002,?,?,?,?,?,?,?,?,?), ref: 17198683
                                              • __vbaAryUnlock.MSVBVM60(?,?,00000002,?,?,?,?,?,?,?,?,?), ref: 1719868C
                                              • __vbaVarMove.MSVBVM60 ref: 171986A7
                                              • __vbaVarTstEq.MSVBVM60(00008003,?), ref: 171986CA
                                                • Part of subcall function 1719847C: __vbaChkstk.MSVBVM60(?,Function_00001006,?,?,?,17198558,?,00006011,?,?,?,?,Function_00001006), ref: 17198497
                                                • Part of subcall function 1719847C: __vbaRefVarAry.MSVBVM60(?,?,?,?,?,Function_00001006,?,?,?,17198558,?,00006011,?,?,?,?), ref: 171984AC
                                                • Part of subcall function 1719847C: __vbaUbound.MSVBVM60(00000001,00000000,?,?,?,?,?,Function_00001006,?,?,?,17198558,?,00006011), ref: 171984B5
                                                • Part of subcall function 1719847C: __vbaVarMove.MSVBVM60(00000001,00000000,?,?,?,?,?,Function_00001006,?,?,?,17198558,?,00006011), ref: 171984CA
                                              • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,00008003,?), ref: 171986EF
                                              • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,?,?,?), ref: 17198700
                                              • #644.MSVBVM60(?,?,?,?,?,?,?,?,?,?), ref: 17198716
                                              • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 17198725
                                              • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 17198731
                                              • #644.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 17198747
                                              • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 17198756
                                              • __vbaFreeVar.MSVBVM60(171987B8,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 171987A7
                                              • __vbaAryDestruct.MSVBVM60(00000000,?,171987B8,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 171987B2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$LockUnlock$#644$ChkstkFreeMoveRedim$DestructErrorListSystemUbound
                                              • String ID:
                                              • API String ID: 1237311878-0
                                              • Opcode ID: 0b6c55b4a15a0d8f16ab56eafac56ee06710d71b9524ec20e384955b4019f846
                                              • Instruction ID: 389457c25d997ca274eb22fc14732a3782216397689150cd66d76fcd64e35b01
                                              • Opcode Fuzzy Hash: 0b6c55b4a15a0d8f16ab56eafac56ee06710d71b9524ec20e384955b4019f846
                                              • Instruction Fuzzy Hash: 8D81D3B5E00208AEDF14DFE4DC85EEEBBBDAF08740F414055F505EB291DA75AA48CB20

                                              Control-flow Graph

                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006), ref: 171973BC
                                                • Part of subcall function 171972E1: __vbaChkstk.MSVBVM60(?,17196B2B,171968AD,?,00000008,?,00000000,Function_00001006,?,?,?,17196809,00000000,-00000004,00000000,00000000), ref: 171972E7
                                              • #644.MSVBVM60(?,171BF83C,?,?,?,?,Function_00001006), ref: 171973E5
                                              • __vbaSetSystemError.MSVBVM60(000000FF,00000000,?,00003000,00000040,?,00000000,00000004,?,171BF83C,?,?,?,?,Function_00001006), ref: 17197415
                                              • __vbaRedim.MSVBVM60(00000080,00000001,171C92C0,00000011,00000001,?,00000000,000000FF,00000000,?,00003000,00000040,?,00000000,00000004,?), ref: 1719743B
                                              • __vbaAryLock.MSVBVM60(?,00000000,?,171BF83C,?,?,?,?,Function_00001006), ref: 1719744F
                                              • #644.MSVBVM60(?,?,00000000,?,171BF83C,?,?,?,?,Function_00001006), ref: 17197465
                                              • __vbaAryUnlock.MSVBVM60(?,?,?,00000000,?,171BF83C,?,?,?,?,Function_00001006), ref: 17197471
                                              • __vbaAryLock.MSVBVM60(?,00000000,?,-00000004,?,?,?,?,00000000,?,171BF83C,?,?,?,?,Function_00001006), ref: 17197499
                                              • #644.MSVBVM60(?,?,00000000,?,-00000004,?,?,?,?,00000000,?,171BF83C,?,?,?,?), ref: 171974AF
                                              • __vbaAryUnlock.MSVBVM60(?,?,?,00000000,?,-00000004,?,?,?,?,00000000,?,171BF83C), ref: 171974BB
                                              • __vbaVarVargNofree.MSVBVM60(?,?,?,?,?,?,00000000,?,-00000004,?,?,?,?,00000000,?,171BF83C), ref: 171974D4
                                              • __vbaStrVarVal.MSVBVM60(?,00000000,?,?,?,?,?,?,00000000,?,-00000004,?,?,?,?,00000000), ref: 171974DE
                                              • #644.MSVBVM60(00000000,?,00000000,?,?,?,?,?,?,00000000,?,-00000004,?,?,?,?), ref: 171974E4
                                              • __vbaAryLock.MSVBVM60(?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,?,-00000004,?,?), ref: 171974F5
                                              • #644.MSVBVM60(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,?,-00000004,?), ref: 1719750B
                                              • __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,?,-00000004), ref: 17197517
                                              • __vbaVarMove.MSVBVM60(?,?,?,00000000,?,?,?,?,?,00000000,?,00000000,?,?,?), ref: 1719754A
                                              • __vbaFreeStr.MSVBVM60(?,?,?,00000000,?,?,?,?,?,00000000,?,00000000,?,?,?), ref: 17197552
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$#644$LockUnlock$Chkstk$ErrorFreeMoveNofreeRedimSystemVarg
                                              • String ID:
                                              • API String ID: 1386985410-0
                                              • Opcode ID: a95d0d4fba2a74412a7b20b2e6aa9aa172c6ef0b5f2a67b98ae7149d5db6653f
                                              • Instruction ID: adc49742321bd7ec3dcf3ddf55e6c4b39ddfc1e2f877dae1ff7ba3edd3181590
                                              • Opcode Fuzzy Hash: a95d0d4fba2a74412a7b20b2e6aa9aa172c6ef0b5f2a67b98ae7149d5db6653f
                                              • Instruction Fuzzy Hash: AF51E5B9A10248AFDF00DFE8DD85EEEBBBAFF14354F028425F501AB294D635A915CB50

                                              Control-flow Graph

                                              APIs
                                              • __vbaChkstk.MSVBVM60(00000000,Function_00001006,?,?,?,1719A148,?,?,?,?,00000000,Function_00001006,?,?,?,1719A0EC), ref: 17197219
                                                • Part of subcall function 171972E1: __vbaChkstk.MSVBVM60(?,17196B2B,171968AD,?,00000008,?,00000000,Function_00001006,?,?,?,17196809,00000000,-00000004,00000000,00000000), ref: 171972E7
                                              • #644.MSVBVM60(?,1719B005,?,?,?,00000000,Function_00001006,?,?,?,1719A148,?,?,?,?,00000000), ref: 1719723C
                                              • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000005,00000000,?,00000000,?,1719B005,?,?,?,00000000,Function_00001006), ref: 17197267
                                              • __vbaAryLock.MSVBVM60(?,?,?,17193DC7), ref: 17197278
                                              • #644.MSVBVM60(?,?,?,?,17193DC7), ref: 1719728E
                                              • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,17193DC7), ref: 1719729A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$#644Chkstk$LockRedimUnlock
                                              • String ID:
                                              • API String ID: 2226984211-0
                                              • Opcode ID: fc0848561dbf00bc92909ff8100194582c6f139784444c7f18a3d716790ab473
                                              • Instruction ID: 37bd7c35f2e94e7cc22862e268e8d27b9fd0b99f387dd49455ff7d625fda52c2
                                              • Opcode Fuzzy Hash: fc0848561dbf00bc92909ff8100194582c6f139784444c7f18a3d716790ab473
                                              • Instruction Fuzzy Hash: 702106B5A00209ABDF00CBE8CD86FEEBBBDEF18741F154025F501BB294D675AA45CB61

                                              Control-flow Graph

                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006,?,?,?,1719A135,?,?,?,?,00000000,Function_00001006,?,?,?,1719A0EC), ref: 1719A088
                                              • __vbaSetSystemError.MSVBVM60(000000FF,00000022,00000030,00000004,?,?,?,?,Function_00001006,?,?,?,1719A135,?), ref: 1719A0B0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$ChkstkErrorSystem
                                              • String ID: 0
                                              • API String ID: 2242893769-4108050209
                                              • Opcode ID: e697e3059928526fb09dc0e6926304a1f2f2f47a550df531f21981402d365cf4
                                              • Instruction ID: b64977349c141e4e999be7d30dd104d7cfbfb2c64d18f4469f0c5743361f994b
                                              • Opcode Fuzzy Hash: e697e3059928526fb09dc0e6926304a1f2f2f47a550df531f21981402d365cf4
                                              • Instruction Fuzzy Hash: D2E09BB9940348BAD710DBD4CD46F9EBA7CD705B91F905155B110A71C4C6757E08C671

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 521 16fa1218-16fa1256 #100 522 16fa1258-16fa125b 521->522 523 16fa12b9-16fa12bd 521->523 524 16fa125e-16fa127f 522->524 525 16fa12bf-16fa12da 522->525 523->525 524->523
                                              APIs
                                              • #100.MSVBVM60(VB5!6&VB6DE.DLL), ref: 16FA121D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: #100
                                              • String ID: VB5!6&VB6DE.DLL
                                              • API String ID: 1341478452-1903704572
                                              • Opcode ID: c815869deec8e191f6565e00a7c7d8dcb182e171ecfbf67b4a4e4521b5462729
                                              • Instruction ID: b84ba37bf23aabecea390a3708c94acaa7b8c5ed53437f57ba3af0ad28d9b5d0
                                              • Opcode Fuzzy Hash: c815869deec8e191f6565e00a7c7d8dcb182e171ecfbf67b4a4e4521b5462729
                                              • Instruction Fuzzy Hash: 9C11522A88E3C15FC3179B708C255867FB2AE5325572A06EBD4D0CF5A3D21D588EC762
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c7c8c976c0652a69813e2c1c168428e6ee8c55dde765d194094190c2dca66623
                                              • Instruction ID: 39197ae16b88f38ac2ee3a6e99b606391a59034fbc860c81385f6b8d5b94a197
                                              • Opcode Fuzzy Hash: c7c8c976c0652a69813e2c1c168428e6ee8c55dde765d194094190c2dca66623
                                              • Instruction Fuzzy Hash: 2E01FFB2700206ABE720DF08C140996BFB2FB2D760FC26032D40587B14E321EC82CA01
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073262366.0000000002160000.00000040.00001000.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2160000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                                              • Instruction ID: fdd3a321bbc083f50f83883b9142f69690866fb637d0f4c5f6d65edd74331ba9
                                              • Opcode Fuzzy Hash: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                                              • Instruction Fuzzy Hash: 7DF039326905649BC730DB5DC84997EB3E9FB90A7072A4499E8A997A00C330FC608A90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073262366.0000000002160000.00000040.00001000.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2160000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 22e608a09c53be72fe80f3d40ea380c068c882c54bc8eb40e23fc33053e393b6
                                              • Instruction ID: 07c2e5acfac4aaa05d71ae35a1f79d4574da1332b4e07bb2196f171c286e60c6
                                              • Opcode Fuzzy Hash: 22e608a09c53be72fe80f3d40ea380c068c882c54bc8eb40e23fc33053e393b6
                                              • Instruction Fuzzy Hash: EFC00234292940CBD24DDA14C2A8AB8B322EB9474CFA5506CD41B0F6D1AB366A23CA80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073262366.0000000002160000.00000040.00001000.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2160000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 65cedfb4e9b775bd9a7481590de2045a9073ba88d3b6e0b39f6c12834087620b
                                              • Instruction ID: d075b7f7f6394f7db4873929bf8cd5138b50b76dc4d719a039d76045825f7676
                                              • Opcode Fuzzy Hash: 65cedfb4e9b775bd9a7481590de2045a9073ba88d3b6e0b39f6c12834087620b
                                              • Instruction Fuzzy Hash: 5DB002315A5490CFD2999F06D15CA7477B8F700645F5654E0F52A9FDA1C3689911CB00
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073262366.0000000002160000.00000040.00001000.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2160000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f12cd29bcc833d0884cc67a00d0b8ef1146f38bf92796a30ee0731e79fce1c12
                                              • Instruction ID: 049e9b97c5dff90f07dbc21cf5f5d41e9fa09f32e655283f92d23f3b4509e0d6
                                              • Opcode Fuzzy Hash: f12cd29bcc833d0884cc67a00d0b8ef1146f38bf92796a30ee0731e79fce1c12
                                              • Instruction Fuzzy Hash: 32B00175266984CFC296CB0AC294F9173B8FB04B41F4618F0E4059BAA2C378AD10CA11
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073262366.0000000002160000.00000040.00001000.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2160000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6116854fbb54b05bb97ad96660f12a07e0695a1790f1bf423a30ad418027d6dc
                                              • Instruction ID: 964f706650ced8da505f29dd85ad780e404a394fc7a64e40fdab450f609e9b9b
                                              • Opcode Fuzzy Hash: 6116854fbb54b05bb97ad96660f12a07e0695a1790f1bf423a30ad418027d6dc
                                              • Instruction Fuzzy Hash: 6CB00135266980CFC296CB0AC694F5073B8FB04A4AF4614F0E4058BA62C338A944CA00
                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006,?,?,Function_00001006), ref: 1719390E
                                              • __vbaRedim.MSVBVM60(00000080,00000001,00000011,00000001,00004000,00000000,?,?,?,?,Function_00001006), ref: 17193947
                                              • __vbaVarVargNofree.MSVBVM60(00000003), ref: 17193979
                                              • __vbaVarAdd.MSVBVM60(?,00000000,00000003), ref: 17193983
                                              • __vbaVarSub.MSVBVM60(?,00000002,00000000,?,00000000,00000003), ref: 17193991
                                              • __vbaI4Var.MSVBVM60(00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193997
                                              • __vbaFreeVar.MSVBVM60(00000000,?,00000002,00000000,?,00000000,00000003), ref: 171939BA
                                              • __vbaAryLock.MSVBVM60(?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A01
                                              • #644.MSVBVM60(?,?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A1D
                                              • __vbaAryUnlock.MSVBVM60(?,?,?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A29
                                              • __vbaVarMove.MSVBVM60(?,?,?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A41
                                              • __vbaVarVargNofree.MSVBVM60(00000003,?,?,?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A62
                                              • __vbaVarAdd.MSVBVM60(?,00000000,00000003,?,?,?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A6C
                                              • __vbaI4Var.MSVBVM60(00000000,?,00000000,00000003,?,?,?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A72
                                              • __vbaFreeVar.MSVBVM60(00000000,?,00000000,00000003,?,?,?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A83
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$FreeNofreeVarg$#644ChkstkLockMoveRedimUnlock
                                              • String ID:
                                              • API String ID: 972117415-0
                                              • Opcode ID: 612a3058fa6dcbd4251af5396ecd36be616abc54f832e040b52b4301bf890ec4
                                              • Instruction ID: 5f92486ebce527ae00bed8f8c6fa2cabd23e704a2a3ab4c8048b68c267053aa7
                                              • Opcode Fuzzy Hash: 612a3058fa6dcbd4251af5396ecd36be616abc54f832e040b52b4301bf890ec4
                                              • Instruction Fuzzy Hash: 4351F379E00248AFDB00CFE8C985FDDBBBAEB08314F51C159E515AB294DB34A949CF50
                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006), ref: 17199138
                                              • __vbaObjSetAddref.MSVBVM60(?,?,?,?,?,?,Function_00001006), ref: 17199151
                                              • __vbaVarMove.MSVBVM60 ref: 17199175
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7B64,0000000C), ref: 171991A7
                                              • __vbaVarCmpGt.MSVBVM60(?,171C92BC,00008003,0000000B), ref: 171991F3
                                              • __vbaVarOr.MSVBVM60(?,00000000,?,171C92BC,00008003,0000000B), ref: 171991FD
                                              • __vbaBoolVarNull.MSVBVM60(00000000,?,00000000,?,171C92BC,00008003,0000000B), ref: 17199203
                                              • __vbaFreeVar.MSVBVM60(00000000,?,00000000,?,171C92BC,00008003,0000000B), ref: 1719920F
                                              • __vbaRedim.MSVBVM60(00000080,00000001,171C9220,00000011,00000001,-00000001,00000000,00000000,?,00000000,?,171C92BC,00008003,0000000B), ref: 17199238
                                              • __vbaAryLock.MSVBVM60(?), ref: 1719924A
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7B64,0000000C), ref: 1719928A
                                              • __vbaAryUnlock.MSVBVM60(?), ref: 171992A2
                                              • __vbaVarMove.MSVBVM60(171C9220,00000040,?), ref: 171992C3
                                              • __vbaFreeObj.MSVBVM60(17199306,171C9220,00000040,?), ref: 17199300
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$CheckFreeHresultMove$AddrefBoolChkstkLockNullRedimUnlock
                                              • String ID:
                                              • API String ID: 4045727025-0
                                              • Opcode ID: 8ab3676f3014e0d3ae81725dad3715223bb197007f8df93986cfe2ada9980fcb
                                              • Instruction ID: 1f1d380975cefff686adbfa781522d1db7b447e1c40ec8ae39a6452c1d10ad36
                                              • Opcode Fuzzy Hash: 8ab3676f3014e0d3ae81725dad3715223bb197007f8df93986cfe2ada9980fcb
                                              • Instruction Fuzzy Hash: 4D510275D00218AEDB10DBE4CC84FEDBBBABB08355F558169E105BB291D774A949CB20
                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006), ref: 17197764
                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,Function_00001006), ref: 1719777C
                                              • __vbaVarDup.MSVBVM60 ref: 17197795
                                              • #606.MSVBVM60(00000104,?), ref: 171977A3
                                              • __vbaStrMove.MSVBVM60(00000104,?), ref: 171977AD
                                              • __vbaFreeVar.MSVBVM60(00000104,?), ref: 171977B5
                                                • Part of subcall function 1719AB52: __vbaChkstk.MSVBVM60(00004008,Function_00001006,?,?,?,171977D0,00004008,00000104,?), ref: 1719AB6D
                                                • Part of subcall function 1719AB52: __vbaVarVargNofree.MSVBVM60(?,?,?,00004008,Function_00001006,?,?,?,171977D0,00004008,00000104,?), ref: 1719AB85
                                                • Part of subcall function 1719AB52: __vbaStrVarVal.MSVBVM60(?,00000000,?,?,?,00004008,Function_00001006,?,?,?,171977D0,00004008,00000104,?), ref: 1719AB8F
                                                • Part of subcall function 1719AB52: #644.MSVBVM60(00000000,?,00000000,?,?,?,00004008,Function_00001006,?,?,?,171977D0,00004008,00000104,?), ref: 1719AB95
                                                • Part of subcall function 1719AB52: __vbaFreeStr.MSVBVM60(00000000,?,00000000,?,?,?,00004008,Function_00001006,?,?,?,171977D0,00004008,00000104,?), ref: 1719ABA0
                                              • __vbaSetSystemError.MSVBVM60(?,?,00000104,?,00004008,00000104,?), ref: 171977FF
                                              • #616.MSVBVM60(?,00000000,?,?,00000104,?,00004008,00000104,?), ref: 17197816
                                              • __vbaStrMove.MSVBVM60(?,00000000,?,?,00000104,?,00004008,00000104,?), ref: 17197820
                                              • __vbaStrCopy.MSVBVM60(?,?,00000104,?,00004008,00000104,?), ref: 1719782F
                                              • __vbaStrCopy.MSVBVM60(?,?,00000104,?,00004008,00000104,?), ref: 1719783A
                                              • __vbaFreeStr.MSVBVM60(17197872,?,?,00000104,?,00004008,00000104,?), ref: 17197864
                                              • __vbaFreeStr.MSVBVM60(17197872,?,?,00000104,?,00004008,00000104,?), ref: 1719786C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$Free$Copy$ChkstkMove$#606#616#644ErrorNofreeSystemVarg
                                              • String ID:
                                              • API String ID: 3132523529-0
                                              • Opcode ID: 36d6af28e7d6c8a3012537ca2398e5325b30cdabd7c32e1b608951b1d1c5f3d7
                                              • Instruction ID: 7a703be05e48959e6736f35600cb6da69d0bbef91aa48e461b14cde0bd3d3a01
                                              • Opcode Fuzzy Hash: 36d6af28e7d6c8a3012537ca2398e5325b30cdabd7c32e1b608951b1d1c5f3d7
                                              • Instruction Fuzzy Hash: 5731C879D0024DAACF00DFE1CD91AEEBBBAEF14381F518425E116A7194DB356A4ACF90
                                              APIs
                                              • __vbaChkstk.MSVBVM60(00000000,Function_00001006,00000000,16FA727C,16FA7270), ref: 171999DE
                                              • __vbaVarDup.MSVBVM60(?,00000008,?,00000000,Function_00001006,00000000), ref: 171999F6
                                              • #653.MSVBVM60(?,?,?,00000008,?,00000000,Function_00001006,00000000), ref: 17199A03
                                              • __vbaI4Var.MSVBVM60(?,?,?,?,00000008,?,00000000,Function_00001006,00000000), ref: 17199A0C
                                              • __vbaFreeVar.MSVBVM60 ref: 17199A28
                                              • #632.MSVBVM60(?,?,00000001,00000002), ref: 17199A6D
                                              • __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00000001,00000002), ref: 17199A7E
                                              • __vbaStrVarMove.MSVBVM60(00000000,?,?,00000008,?,?,00000001,00000002), ref: 17199A84
                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000008,?,?,00000001,00000002), ref: 17199A8E
                                              • __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?,00000000,?,?,00000008,?,?,00000001,00000002), ref: 17199AA1
                                              • __vbaFreeVar.MSVBVM60(17199AE4), ref: 17199ADE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$Free$Move$#632#653ChkstkList
                                              • String ID:
                                              • API String ID: 1058303707-0
                                              • Opcode ID: 0478f2dd5627254154f6a1a7f72cc7d7e2afdd880c67e6b0986df746334587fe
                                              • Instruction ID: ed589f9cd38006fcb4ee57163f207fc3c18a65e7e9d24d0e99b134b120b537d7
                                              • Opcode Fuzzy Hash: 0478f2dd5627254154f6a1a7f72cc7d7e2afdd880c67e6b0986df746334587fe
                                              • Instruction Fuzzy Hash: 2531FAB6C0020DABDB00DBE4DC85EEEBBBDEB18741F518426E111A7190EB74A609CB50
                                              APIs
                                              • __vbaChkstk.MSVBVM60(00000008,Function_00001006,?,?,?,1719A7DE,00000008,171C83C8,171C81B0,00000000,?,00000000,16FA7FB8,00000000,?,00000000), ref: 171970F7
                                              • __vbaVarVargNofree.MSVBVM60(?,?,?,00000008,Function_00001006,?,?,?,1719A7DE,00000008,171C83C8,171C81B0,00000000,?,00000000,16FA7FB8), ref: 17197118
                                              • __vbaStrVarVal.MSVBVM60(00000000,00000000,?,?,?,00000008,Function_00001006,?,?,?,1719A7DE,00000008,171C83C8,171C81B0,00000000,?), ref: 17197122
                                              • #644.MSVBVM60(00000000,00000000,00000000,?,?,?,00000008,Function_00001006,?,?,?,1719A7DE,00000008,171C83C8,171C81B0,00000000), ref: 17197128
                                              • __vbaSetSystemError.MSVBVM60(?,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,00000000,00000000,?,?,?,00000008,Function_00001006,?), ref: 1719714D
                                              • __vbaFreeStr.MSVBVM60(?,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,00000000,00000000,?,?,?,00000008,Function_00001006,?), ref: 1719715B
                                              • __vbaAryLock.MSVBVM60(1719A0EC,?,?,?,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,00000000,00000000), ref: 17197188
                                              • __vbaSetSystemError.MSVBVM60(17193DC7,0000A164,?,?,00000000,1719A0EC,?,?,?,C0000000,00000003,00000000,00000002,00000080,00000000,00000000), ref: 171971AF
                                              • __vbaAryUnlock.MSVBVM60(1719A0EC,17193DC7,0000A164,?,?,00000000,1719A0EC,?,?,?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 171971B8
                                              • __vbaSetSystemError.MSVBVM60(17193DC7,?,?,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,00000000,00000000,?,?,?,00000008), ref: 171971C5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$ErrorSystem$#644ChkstkFreeLockNofreeUnlockVarg
                                              • String ID:
                                              • API String ID: 2579818117-0
                                              • Opcode ID: 2edc5fbf1d6df60609c6affc9eafff4747e48040afd22fc9461c567db0b86c0d
                                              • Instruction ID: c934549a4414bb21b41991f856f9b2308e9c1f92a5943ca0aaefa88fb1ca3da5
                                              • Opcode Fuzzy Hash: 2edc5fbf1d6df60609c6affc9eafff4747e48040afd22fc9461c567db0b86c0d
                                              • Instruction Fuzzy Hash: EA31EC79900209AFDF15DFA4CD86FAEBBB9EF04741F518015F501BB290DA35B914CB61
                                              APIs
                                              • __vbaChkstk.MSVBVM60(00000000,Function_00001006), ref: 17198FF5
                                              • __vbaObjSetAddref.MSVBVM60(?,171C8358,?,?,?,00000000,Function_00001006), ref: 1719900E
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7B64,0000000C), ref: 17199040
                                                • Part of subcall function 17198F0F: __vbaChkstk.MSVBVM60(?,Function_00001006), ref: 17198F2B
                                                • Part of subcall function 17198F0F: __vbaVarDup.MSVBVM60 ref: 17198F51
                                                • Part of subcall function 17198F0F: __vbaVarVargNofree.MSVBVM60(?), ref: 17198F60
                                                • Part of subcall function 17198F0F: __vbaI4Var.MSVBVM60(00000000,?), ref: 17198F66
                                                • Part of subcall function 17198F0F: #606.MSVBVM60(00000000,00000000,?), ref: 17198F6C
                                                • Part of subcall function 17198F0F: __vbaVarMove.MSVBVM60(00000000,00000000,?), ref: 17198F81
                                                • Part of subcall function 17198F0F: __vbaFreeVar.MSVBVM60(00000000,00000000,?), ref: 17198F89
                                              • __vbaStrVarMove.MSVBVM60(?,?,00004003), ref: 1719907D
                                              • __vbaStrMove.MSVBVM60(?,?,00004003), ref: 17199087
                                              • __vbaFreeVar.MSVBVM60(?,?,00004003), ref: 1719908F
                                              • #644.MSVBVM60(?,?,?,00004003), ref: 17199097
                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,16FA7B64,0000000C), ref: 171990CF
                                              • __vbaFreeObj.MSVBVM60(17199108), ref: 17199102
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$FreeMove$CheckChkstkHresult$#606#644AddrefNofreeVarg
                                              • String ID:
                                              • API String ID: 1673250073-0
                                              • Opcode ID: 336fcb78d4622bf7c04782afed48e484cfaf1dd15d348fe59f64884af5f2a336
                                              • Instruction ID: 9910d53aa2eb21936c37aed9a2e4304aecf92ec26650ec494736e58a07754bdf
                                              • Opcode Fuzzy Hash: 336fcb78d4622bf7c04782afed48e484cfaf1dd15d348fe59f64884af5f2a336
                                              • Instruction Fuzzy Hash: 2631C1B5D0020AEFDB50DBD4DC84FEEBBBABF14351F508026E221A61A4D738A54ACF51
                                              APIs
                                              • __vbaChkstk.MSVBVM60(00000000,Function_00001006), ref: 17199340
                                              • #698.MSVBVM60(?,?), ref: 171993C9
                                              • __vbaVarCat.MSVBVM60(?,?,00000008,?,?), ref: 171993DA
                                              • __vbaStrVarMove.MSVBVM60(00000000,?,?,00000008,?,?), ref: 171993E0
                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000008,?,?), ref: 171993EA
                                              • __vbaFreeVarList.MSVBVM60(00000002,?,?,00000000,?,?,00000008,?,?), ref: 171993F9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$Move$#698ChkstkFreeList
                                              • String ID: @
                                              • API String ID: 2118762426-2766056989
                                              • Opcode ID: 818568e46a51220863f274f91ccb83e2665b9891240dd249de07dcbdd87f5d26
                                              • Instruction ID: 4381788544769475434dada1147c6649bbdd5ff73714481c5c45037660334b30
                                              • Opcode Fuzzy Hash: 818568e46a51220863f274f91ccb83e2665b9891240dd249de07dcbdd87f5d26
                                              • Instruction Fuzzy Hash: 6631E5B5D00258AFDB01DFE4C980EEEBBB9FB49341F11812AE505EB244D734A94ACF91
                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006), ref: 171937E0
                                                • Part of subcall function 171938F2: __vbaChkstk.MSVBVM60(?,Function_00001006,?,?,Function_00001006), ref: 1719390E
                                                • Part of subcall function 171938F2: __vbaRedim.MSVBVM60(00000080,00000001,00000011,00000001,00004000,00000000,?,?,?,?,Function_00001006), ref: 17193947
                                                • Part of subcall function 171938F2: __vbaVarVargNofree.MSVBVM60(00000003), ref: 17193979
                                                • Part of subcall function 171938F2: __vbaVarAdd.MSVBVM60(?,00000000,00000003), ref: 17193983
                                                • Part of subcall function 171938F2: __vbaVarSub.MSVBVM60(?,00000002,00000000,?,00000000,00000003), ref: 17193991
                                                • Part of subcall function 171938F2: __vbaI4Var.MSVBVM60(00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193997
                                                • Part of subcall function 171938F2: __vbaFreeVar.MSVBVM60(00000000,?,00000002,00000000,?,00000000,00000003), ref: 171939BA
                                                • Part of subcall function 171938F2: __vbaAryLock.MSVBVM60(?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A01
                                                • Part of subcall function 171938F2: #644.MSVBVM60(?,?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A1D
                                                • Part of subcall function 171938F2: __vbaAryUnlock.MSVBVM60(?,?,?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A29
                                                • Part of subcall function 171938F2: __vbaVarMove.MSVBVM60(?,?,?,171C9344,00000000,?,00000002,00000000,?,00000000,00000003), ref: 17193A41
                                              • __vbaI4Var.MSVBVM60(?,?,00000002), ref: 17193811
                                              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,00000002), ref: 17193823
                                              • #644.MSVBVM60(?), ref: 17193844
                                              • #644.MSVBVM60(171C8170,?,?,?), ref: 1719385E
                                              • #644.MSVBVM60(17191CA3,?,?,171C8170,?,?,?), ref: 17193880
                                              • #644.MSVBVM60(?,?,?,17191CA3,?,?,171C8170,?,?,?), ref: 17193897
                                              • #644.MSVBVM60(?,?,?,?,17191CA3,?,?,171C8170,?,?,?), ref: 171938A3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$#644$ChkstkFree$ListLockMoveNofreeRedimUnlockVarg
                                              • String ID:
                                              • API String ID: 3502731674-0
                                              • Opcode ID: 85f91cff89cf540e93122d6d5ad8be78acd39e64ae7663d38d600759f3e9501b
                                              • Instruction ID: de2e1a0a022e2721cfe5aaff1adf8d2e18546322417531a5c2030a898ee5f83b
                                              • Opcode Fuzzy Hash: 85f91cff89cf540e93122d6d5ad8be78acd39e64ae7663d38d600759f3e9501b
                                              • Instruction Fuzzy Hash: 5131F0B9D0024CAFCF01DFE4CC46AEEBBBDEF04740F014126E515AA264DB34AA09CB91
                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006), ref: 17198F2B
                                              • __vbaVarDup.MSVBVM60 ref: 17198F51
                                              • __vbaVarVargNofree.MSVBVM60(?), ref: 17198F60
                                              • __vbaI4Var.MSVBVM60(00000000,?), ref: 17198F66
                                              • #606.MSVBVM60(00000000,00000000,?), ref: 17198F6C
                                              • __vbaVarMove.MSVBVM60(00000000,00000000,?), ref: 17198F81
                                              • __vbaFreeVar.MSVBVM60(00000000,00000000,?), ref: 17198F89
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$#606ChkstkFreeMoveNofreeVarg
                                              • String ID:
                                              • API String ID: 892074751-0
                                              • Opcode ID: f51742f32ca7d73c334945cbc99caecbfcf2ca31e693eca3327f540d84baf5d9
                                              • Instruction ID: 74712322ea11974bf14931e2b99eb4ae4db78d6c4998bdae3fec71c52b0ebcd5
                                              • Opcode Fuzzy Hash: f51742f32ca7d73c334945cbc99caecbfcf2ca31e693eca3327f540d84baf5d9
                                              • Instruction Fuzzy Hash: 4601DA7890134CAACB00DBE5DE45EEEBBBEAF14785F518425E409A7184DB746A0DCB50
                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006,00000000,16FA72D8,16FA72D0,16FA72A8,00000000,16FA7294,00000000,16FA727C,16FA7270), ref: 17197315
                                              • __vbaVarVargNofree.MSVBVM60(?,00000008,?,?,Function_00001006,00000000), ref: 1719732D
                                              • __vbaStrVarVal.MSVBVM60(?,00000000,?,00000008,?,?,Function_00001006,00000000), ref: 17197337
                                              • #644.MSVBVM60(00000000,?,00000000,?,00000008,?,?,Function_00001006,00000000), ref: 1719733D
                                              • __vbaVarMove.MSVBVM60 ref: 17197352
                                              • __vbaFreeStr.MSVBVM60 ref: 1719735A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$#644ChkstkFreeMoveNofreeVarg
                                              • String ID:
                                              • API String ID: 2413382268-0
                                              • Opcode ID: 720de130fc8bf2c767d50a2ebad3745f3b632382cccf20ef4a16386e59e318cc
                                              • Instruction ID: 239509aa06582f314886da1ce7c268191b8b3ed03ca76dc65789a8ccbe718ea3
                                              • Opcode Fuzzy Hash: 720de130fc8bf2c767d50a2ebad3745f3b632382cccf20ef4a16386e59e318cc
                                              • Instruction Fuzzy Hash: 58F04979C00308AACB10DBA0CC80FEEBB7DAF14691F418529E001B6284DA346A0ACBA1
                                              APIs
                                              • __vbaChkstk.MSVBVM60(00000000,Function_00001006,?,?,?,17196809,00000000,-00000004,00000000,00000000,00000000,0000E0FF,16FA7294,171C92CC,00000000), ref: 17196B0F
                                                • Part of subcall function 171972E1: __vbaChkstk.MSVBVM60(?,17196B2B,171968AD,?,00000008,?,00000000,Function_00001006,?,?,?,17196809,00000000,-00000004,00000000,00000000), ref: 171972E7
                                              • #644.MSVBVM60(?,171968AD,?,00000008,?,00000000,Function_00001006,?,?,?,17196809,00000000,-00000004,00000000,00000000,00000000), ref: 17196B3B
                                              • #644.MSVBVM60(00000001,?,171968AD,?,00000008,?,00000000,Function_00001006,?,?,?,17196809,00000000,-00000004,00000000,00000000), ref: 17196B4A
                                              • #644.MSVBVM60(?,00000000,00000001,?,171968AD,?,00000008,?,00000000,Function_00001006,?,?,?,17196809,00000000,-00000004), ref: 17196B66
                                              • #644.MSVBVM60(00000000,?,00000004,?,00000000,00000001,?,171968AD,?,00000008,?,00000000,Function_00001006), ref: 17196B8D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: #644$Chkstk__vba
                                              • String ID:
                                              • API String ID: 1305800526-0
                                              • Opcode ID: eb1d0733d04137dfd517f3d15ee17f3b0a9edf601ef26b63d72791f788e9ba9c
                                              • Instruction ID: 0f626f6a01fc4a3be45d2b3cc760d527317fb6a4cd78405c7f504ced9ab94c9b
                                              • Opcode Fuzzy Hash: eb1d0733d04137dfd517f3d15ee17f3b0a9edf601ef26b63d72791f788e9ba9c
                                              • Instruction Fuzzy Hash: B4115EB5900204AFDB10CFE4CE86FAEBFBEEB047A0F514565F001BA254D635AE01CB24
                                              APIs
                                              • __vbaChkstk.MSVBVM60(00004008,Function_00001006,?,?,?,171977D0,00004008,00000104,?), ref: 1719AB6D
                                              • __vbaVarVargNofree.MSVBVM60(?,?,?,00004008,Function_00001006,?,?,?,171977D0,00004008,00000104,?), ref: 1719AB85
                                              • __vbaStrVarVal.MSVBVM60(?,00000000,?,?,?,00004008,Function_00001006,?,?,?,171977D0,00004008,00000104,?), ref: 1719AB8F
                                              • #644.MSVBVM60(00000000,?,00000000,?,?,?,00004008,Function_00001006,?,?,?,171977D0,00004008,00000104,?), ref: 1719AB95
                                              • __vbaFreeStr.MSVBVM60(00000000,?,00000000,?,?,?,00004008,Function_00001006,?,?,?,171977D0,00004008,00000104,?), ref: 1719ABA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$#644ChkstkFreeNofreeVarg
                                              • String ID:
                                              • API String ID: 1831340853-0
                                              • Opcode ID: 489c18ccc671fca6acc20d7362923864f8296d025c86dbefb69793828b58324c
                                              • Instruction ID: 5bd1f858acf45bf8796b1ffcff248a6682d3f4114e99a48704add8b6b7d1e1a5
                                              • Opcode Fuzzy Hash: 489c18ccc671fca6acc20d7362923864f8296d025c86dbefb69793828b58324c
                                              • Instruction Fuzzy Hash: A0F082B5800348BACB10DB90CD81EEFBB7EEB10691F414519F102A7184DA34BA09C6A0
                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006,?,?,?,17198558,?,00006011,?,?,?,?,Function_00001006), ref: 17198497
                                              • __vbaRefVarAry.MSVBVM60(?,?,?,?,?,Function_00001006,?,?,?,17198558,?,00006011,?,?,?,?), ref: 171984AC
                                              • __vbaUbound.MSVBVM60(00000001,00000000,?,?,?,?,?,Function_00001006,?,?,?,17198558,?,00006011), ref: 171984B5
                                              • __vbaVarMove.MSVBVM60(00000001,00000000,?,?,?,?,?,Function_00001006,?,?,?,17198558,?,00006011), ref: 171984CA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$ChkstkMoveUbound
                                              • String ID:
                                              • API String ID: 2614284155-0
                                              • Opcode ID: 4ef72a9ac3e5adfe2f7deeadf6a45ec7f668060420f1e6786ae12d953e03ebc2
                                              • Instruction ID: 21f18408836a8b6dac7d626c0dcae752b48950f0cc296069febac1264d02b304
                                              • Opcode Fuzzy Hash: 4ef72a9ac3e5adfe2f7deeadf6a45ec7f668060420f1e6786ae12d953e03ebc2
                                              • Instruction Fuzzy Hash: C7F05874890348BEDB20CF81CC41F8EBBB9FB14692F409129F400A7190D7B56904CA60
                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006), ref: 17193E90
                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,Function_00001006), ref: 17193EC2
                                              Strings
                                              • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 17193EBA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$ChkstkCopy
                                              • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider
                                              • API String ID: 4177765151-63410773
                                              • Opcode ID: 972c47899b109f3b3e0380e0df78953c3676f9bfa8957202362d632691d50783
                                              • Instruction ID: 7fe30b07628489fb5f7d42ceafce9c3056c00e20ef9b406c9f9e262caa408b8e
                                              • Opcode Fuzzy Hash: 972c47899b109f3b3e0380e0df78953c3676f9bfa8957202362d632691d50783
                                              • Instruction Fuzzy Hash: 96018639509384BFC712CF64CC55B9A7FB5EF42640F058196F4409B1A1C7389D19CB51
                                              APIs
                                              • __vbaChkstk.MSVBVM60(?,Function_00001006), ref: 17193F1B
                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,Function_00001006), ref: 17193F4D
                                              Strings
                                              • Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype), xrefs: 17193F45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2073480716.0000000016FA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 16FA0000, based on PE: true
                                              • Associated: 00000000.00000002.2073459973.0000000016FA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073506583.0000000016FA7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073522819.0000000016FA8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073688996.00000000171C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073705566.00000000171C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.00000000171CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2073720013.0000000017210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16fa0000_rordendecompra_.jbxd
                                              Similarity
                                              • API ID: __vba$ChkstkCopy
                                              • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)
                                              • API String ID: 4177765151-1112895469
                                              • Opcode ID: e21ef735cc25e5b13d53a4a9d4ee8e197001a62aab00d067be0cc7e80368440a
                                              • Instruction ID: 2dceb5d3d59f90bbbc2898a5e340148dda0b0584e03b6f8ffa3429c56f8d4bc7
                                              • Opcode Fuzzy Hash: e21ef735cc25e5b13d53a4a9d4ee8e197001a62aab00d067be0cc7e80368440a
                                              • Instruction Fuzzy Hash: BAF03438500348FFCB10DF58CD85B9ABBB8EF40795F418469F405AB294C778A919CB92

                                              Execution Graph

                                              Execution Coverage:9%
                                              Dynamic/Decrypted Code Coverage:60.9%
                                              Signature Coverage:0%
                                              Total number of Nodes:23
                                              Total number of Limit Nodes:3
                                              execution_graph 26664 683a950 26665 683a996 GetCurrentProcess 26664->26665 26667 683a9e1 26665->26667 26668 683a9e8 GetCurrentThread 26665->26668 26667->26668 26669 683aa25 GetCurrentProcess 26668->26669 26670 683aa1e 26668->26670 26671 683aa5b 26669->26671 26670->26669 26672 683aa83 GetCurrentThreadId 26671->26672 26673 683aab4 26672->26673 26652 442000 26653 442006 26652->26653 26655 442013 26653->26655 26656 44639f GetPEB 26653->26656 26657 44650c 26658 446752 26657->26658 26661 445c67 GetPEB 26658->26661 26674 683ab98 DuplicateHandle 26675 683ac2e 26674->26675 26662 445fc8 NtAllocateVirtualMemory 26663 445ede 26662->26663 26681 2d57068 26682 2d570ac CheckRemoteDebuggerPresent 26681->26682 26683 2d570ee 26682->26683

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 532 6831140-6831161 533 6831163-6831166 532->533 534 6831907-683190a 533->534 535 683116c-683118b 533->535 536 6831930-6831932 534->536 537 683190c-683192b 534->537 545 68311a4-68311ae 535->545 546 683118d-6831190 535->546 538 6831934 536->538 539 6831939-683193c 536->539 537->536 538->539 539->533 542 6831942-683194b 539->542 549 68311b4-68311c3 545->549 546->545 547 6831192-68311a2 546->547 547->549 658 68311c5 call 6831a23 549->658 659 68311c5 call 6831960 549->659 660 68311c5 call 6831959 549->660 551 68311ca-68311cf 552 68311d1-68311d7 551->552 553 68311dc-68314b9 551->553 552->542 574 68318f9-6831906 553->574 575 68314bf-683156e 553->575 584 6831570-6831595 575->584 585 6831597 575->585 587 68315a0-68315b3 584->587 585->587 589 68318e0-68318ec 587->589 590 68315b9-68315db 587->590 589->575 591 68318f2 589->591 590->589 593 68315e1-68315eb 590->593 591->574 593->589 594 68315f1-68315fc 593->594 594->589 595 6831602-68316d8 594->595 607 68316e6-6831716 595->607 608 68316da-68316dc 595->608 612 6831724-6831730 607->612 613 6831718-683171a 607->613 608->607 614 6831732-6831736 612->614 615 6831790-6831794 612->615 613->612 614->615 618 6831738-6831762 614->618 616 68318d1-68318da 615->616 617 683179a-68317d6 615->617 616->589 616->595 629 68317e4-68317f2 617->629 630 68317d8-68317da 617->630 625 6831770-683178d 618->625 626 6831764-6831766 618->626 625->615 626->625 632 68317f4-68317ff 629->632 633 6831809-6831814 629->633 630->629 632->633 636 6831801 632->636 637 6831816-683181c 633->637 638 683182c-683183d 633->638 636->633 639 6831820-6831822 637->639 640 683181e 637->640 642 6831855-6831861 638->642 643 683183f-6831845 638->643 639->638 640->638 647 6831863-6831869 642->647 648 6831879-68318ca 642->648 644 6831847 643->644 645 6831849-683184b 643->645 644->642 645->642 649 683186b 647->649 650 683186d-683186f 647->650 648->616 649->648 650->648 658->551 659->551 660->551
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4497525280.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6830000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                              • API String ID: 0-3723351465
                                              • Opcode ID: db9fa9d9020ae35a89ad855674e6aa44657015e1030d8d0af5392c8985826b40
                                              • Instruction ID: d8e7d7ff7ac358d85364e859bdeeb3e7b5dd1a83b1ee9748ff4ca9d0c74a128f
                                              • Opcode Fuzzy Hash: db9fa9d9020ae35a89ad855674e6aa44657015e1030d8d0af5392c8985826b40
                                              • Instruction Fuzzy Hash: 79324E31E106198FDB14DF78D89499DB7B2FF89300F20D6AAD449A7224EF30AD85CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 771 6833a88-6833aa6 772 6833aa8-6833aab 771->772 773 6833ace-6833ad1 772->773 774 6833aad-6833ac9 772->774 775 6833ad3-6833aed 773->775 776 6833af2-6833af5 773->776 774->773 775->776 777 6833b02-6833b05 776->777 778 6833af7-6833b01 776->778 781 6833b07-6833b15 777->781 782 6833b1c-6833b1e 777->782 786 6833b2e-6833b44 781->786 789 6833b17 781->789 784 6833b20 782->784 785 6833b25-6833b28 782->785 784->785 785->772 785->786 791 6833d60-6833d6a 786->791 792 6833b4a-6833b53 786->792 789->782 793 6833d6b-6833da7 792->793 794 6833b59-6833b76 792->794 797 6833da9-6833dac 793->797 803 6833d4d-6833d5a 794->803 804 6833b7c-6833ba4 794->804 799 6833dcf-6833dd2 797->799 800 6833dae-6833dca 797->800 801 6833dd8-6833de4 799->801 802 6833e7f-6833e82 799->802 800->799 810 6833def-6833df1 801->810 805 68340b8-68340ba 802->805 806 6833e88-6833e97 802->806 803->791 803->792 804->803 825 6833baa-6833bb3 804->825 808 68340c1-68340c4 805->808 809 68340bc 805->809 821 6833eb6-6833efa 806->821 822 6833e99-6833eb4 806->822 808->797 813 68340ca-68340d3 808->813 809->808 814 6833df3-6833df9 810->814 815 6833e09-6833e0d 810->815 817 6833dfb 814->817 818 6833dfd-6833dff 814->818 819 6833e1b 815->819 820 6833e0f-6833e19 815->820 817->815 818->815 824 6833e20-6833e22 819->824 820->824 831 6833f00-6833f11 821->831 832 683408c-68340a2 821->832 822->821 828 6833e24-6833e27 824->828 829 6833e39-6833e72 824->829 825->793 826 6833bb9-6833bd5 825->826 837 6833d3b-6833d47 826->837 838 6833bdb-6833c05 call 6830de8 826->838 828->813 829->806 852 6833e74-6833e7e 829->852 842 6834077-6834086 831->842 843 6833f17-6833f34 831->843 832->805 837->803 837->825 855 6833d31-6833d36 838->855 856 6833c0b-6833c33 838->856 842->831 842->832 843->842 854 6833f3a-6834031 843->854 903 6834033-683403d 854->903 904 683403f 854->904 855->837 856->855 863 6833c39-6833c67 856->863 863->855 868 6833c6d-6833c76 863->868 868->855 869 6833c7c-6833cae 868->869 877 6833cb0-6833cb4 869->877 878 6833cb9-6833cd5 869->878 877->855 880 6833cb6 877->880 878->837 881 6833cd7-6833d2f 878->881 880->878 881->837 905 6834044-6834046 903->905 904->905 905->842 906 6834048-683404d 905->906 907 683405b 906->907 908 683404f-6834059 906->908 909 6834060-6834062 907->909 908->909 909->842 910 6834064-6834070 909->910 910->842
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4497525280.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6830000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $]q$$]q
                                              • API String ID: 0-127220927
                                              • Opcode ID: 10c75406eb95d83ef30157c9956f4a80a549b08c21f918185386002b3f9c143a
                                              • Instruction ID: fa1bb7e36f40f951da2d8608a026b383f32f89f5d45c0d67fb9dbebde51f97e5
                                              • Opcode Fuzzy Hash: 10c75406eb95d83ef30157c9956f4a80a549b08c21f918185386002b3f9c143a
                                              • Instruction Fuzzy Hash: 50029A30B002699FDB98DF68D490AAEB7E2EF84304F148569D505EB395DB39EC46CBC1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4495596329.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_2d50000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8415c45c58ef48a51dccb9e9a7ed3ebfc26f0abd38dced36909dd3cf509cb838
                                              • Instruction ID: cc4cadab3f544ba3ed1f52b1ff219c11c3f585eb1dceccb7bfd6db967271c267
                                              • Opcode Fuzzy Hash: 8415c45c58ef48a51dccb9e9a7ed3ebfc26f0abd38dced36909dd3cf509cb838
                                              • Instruction Fuzzy Hash: 5F53EA31D10B1A8ACB51EF68C8406A9F7B1FF99300F15D79AE45877221EF70AAD5CB81
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4495596329.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_2d50000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 32c5b487ed30076b880deae86b3ac65ce9597dab17582f2e1efc129707817c9d
                                              • Instruction ID: f6b3334f4c1e82ab2207b0fd8f90c2ea755f22bbe2851507136af81b721c5fa7
                                              • Opcode Fuzzy Hash: 32c5b487ed30076b880deae86b3ac65ce9597dab17582f2e1efc129707817c9d
                                              • Instruction Fuzzy Hash: 2C332031D107598EDB11EF68C8806ADF7B1FF99300F15C79AD459AB221EB70AAC5CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1997 2d57068-2d570ec CheckRemoteDebuggerPresent 1999 2d570f5-2d57130 1997->1999 2000 2d570ee-2d570f4 1997->2000 2000->1999
                                              APIs
                                              • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 02D570DF
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4495596329.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_2d50000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CheckDebuggerPresentRemote
                                              • String ID:
                                              • API String ID: 3662101638-0
                                              • Opcode ID: cf1bf19ce47cc00a21b47471b86509dbb886d6dde47db9f1bb139338a096de9d
                                              • Instruction ID: 3836bed5779b358d7886054620d26be8dd32a0c53eee19d0f52b29c4cef1aca3
                                              • Opcode Fuzzy Hash: cf1bf19ce47cc00a21b47471b86509dbb886d6dde47db9f1bb139338a096de9d
                                              • Instruction Fuzzy Hash: 032148B18002598FDB10CF9AC584BEEFBF4AF49310F24845AE859A3350D778A944CFA1
                                              APIs
                                              • NtAllocateVirtualMemory.NTDLL(000000FF), ref: 00445FD0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4494463965.0000000000442000.00000040.80000000.00040000.00000000.sdmp, Offset: 00442000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_442000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AllocateMemoryVirtual
                                              • String ID:
                                              • API String ID: 2167126740-0
                                              • Opcode ID: b351929d1fa472c679804f86bae459197247e42cd6acfc9b4eea4f151430fdae
                                              • Instruction ID: e50c2ac94710a6cf04eacaf9c5dc19499d7648d2dcc9f26762587f4de926560b
                                              • Opcode Fuzzy Hash: b351929d1fa472c679804f86bae459197247e42cd6acfc9b4eea4f151430fdae
                                              • Instruction Fuzzy Hash: 8CD0A771408447DBFF11C7848458DE837A06B11328B6501829023C20E2D528D64F971B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4495596329.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_2d50000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \V6m
                                              • API String ID: 0-1924247956
                                              • Opcode ID: 93b3647daaaffcc1f99131ceed690a5dd32e4cfd0accfb77157d04efd65c44d0
                                              • Instruction ID: 2c3e2b3c8c41c58153e3b2f52d1fa5856b6b350ff801adc6da4e59e20276e046
                                              • Opcode Fuzzy Hash: 93b3647daaaffcc1f99131ceed690a5dd32e4cfd0accfb77157d04efd65c44d0
                                              • Instruction Fuzzy Hash: C6915E70E00219DFDF50CFA9D98579DBBF2AF88314F248129E815A7394DBB49C85CB92
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4497525280.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6830000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d305e2a0d16f5fefcf730eb4d2beb1da9f3d38240bec819a27d35d08cca0a9d0
                                              • Instruction ID: b24fd4f58d9f6e11c430de9a9820374b9a9ba592408136fd13dcbb8fcf1ca0c2
                                              • Opcode Fuzzy Hash: d305e2a0d16f5fefcf730eb4d2beb1da9f3d38240bec819a27d35d08cca0a9d0
                                              • Instruction Fuzzy Hash: 1F629D34A002189FDB54DF68D5A4BADB7F2EF88314F148469D906EB364DB35ED46CB80
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4495596329.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_2d50000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 41c1c4bcfe4e290a618bb6b5ad3bd172f65e47f4df23de76e6c2c051dbd7f54e
                                              • Instruction ID: 7a0d25ec603663c7837bc8e1b1e596555d0b2491b2ecbf2ecd01cca127dec26b
                                              • Opcode Fuzzy Hash: 41c1c4bcfe4e290a618bb6b5ad3bd172f65e47f4df23de76e6c2c051dbd7f54e
                                              • Instruction Fuzzy Hash: 82325D31A002299FDF14DFA8D984BADBBB2EF88310F248565E809DB395DB75DC41CB91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4495596329.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_2d50000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bc20edf82b0bd52c18024208a1000744dbb5f8c7f666d14af65774f0a037f3df
                                              • Instruction ID: b81aaf0a6d2114d0ca2fbad08da34d5572f0631372f100fe5618ea8a247c184f
                                              • Opcode Fuzzy Hash: bc20edf82b0bd52c18024208a1000744dbb5f8c7f666d14af65774f0a037f3df
                                              • Instruction Fuzzy Hash: FCB16F74E00619CFDF10CFA9D9817ADBBF2AF88318F148529D815E7354EBB49885CB92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 661 683a94b-683a9df GetCurrentProcess 665 683a9e1-683a9e7 661->665 666 683a9e8-683aa1c GetCurrentThread 661->666 665->666 667 683aa25-683aa59 GetCurrentProcess 666->667 668 683aa1e-683aa24 666->668 670 683aa62-683aa7d call 683ab20 667->670 671 683aa5b-683aa61 667->671 668->667 674 683aa83-683aab2 GetCurrentThreadId 670->674 671->670 675 683aab4-683aaba 674->675 676 683aabb-683ab1d 674->676 675->676
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0683A9CE
                                              • GetCurrentThread.KERNEL32 ref: 0683AA0B
                                              • GetCurrentProcess.KERNEL32 ref: 0683AA48
                                              • GetCurrentThreadId.KERNEL32 ref: 0683AAA1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4497525280.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6830000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 6cd7f43a37694174e883e5762e6287fd5c3725ec521efaf46b94c5c08203d5f8
                                              • Instruction ID: 14f0862dbc79ba173038da79a7a63b164d15154f8bb303a710935a28b30ebbf7
                                              • Opcode Fuzzy Hash: 6cd7f43a37694174e883e5762e6287fd5c3725ec521efaf46b94c5c08203d5f8
                                              • Instruction Fuzzy Hash: 2C5157B0D002498FDB58DFA9D948BAEBBF5EF48304F208459D119B7350D7389988CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 683 683a950-683a9df GetCurrentProcess 687 683a9e1-683a9e7 683->687 688 683a9e8-683aa1c GetCurrentThread 683->688 687->688 689 683aa25-683aa59 GetCurrentProcess 688->689 690 683aa1e-683aa24 688->690 692 683aa62-683aa7d call 683ab20 689->692 693 683aa5b-683aa61 689->693 690->689 696 683aa83-683aab2 GetCurrentThreadId 692->696 693->692 697 683aab4-683aaba 696->697 698 683aabb-683ab1d 696->698 697->698
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0683A9CE
                                              • GetCurrentThread.KERNEL32 ref: 0683AA0B
                                              • GetCurrentProcess.KERNEL32 ref: 0683AA48
                                              • GetCurrentThreadId.KERNEL32 ref: 0683AAA1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4497525280.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6830000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 0f8d0327a33b2fa65f0ba4a8ba2967623df21e532acfe963dcee274aea40024c
                                              • Instruction ID: c58070394030ed245813dedfb952d3f46fdf81f260de2c4c9385d8958bcf95fc
                                              • Opcode Fuzzy Hash: 0f8d0327a33b2fa65f0ba4a8ba2967623df21e532acfe963dcee274aea40024c
                                              • Instruction Fuzzy Hash: B15156B0D002498FDB58DFA9D948BAEBBF5EF48304F208459D519B7360D7389988CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1990 2d57060-2d570ec CheckRemoteDebuggerPresent 1993 2d570f5-2d57130 1990->1993 1994 2d570ee-2d570f4 1990->1994 1994->1993
                                              APIs
                                              • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 02D570DF
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4495596329.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_2d50000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CheckDebuggerPresentRemote
                                              • String ID:
                                              • API String ID: 3662101638-0
                                              • Opcode ID: 6ec6813ecce97b8c5f8ee7286da0a406d2e520b2b9e2182cb652e457f991f352
                                              • Instruction ID: d081c38a7a121be57462d8c59f6112fa9b13798503a9cd2a776993dce1fde2f3
                                              • Opcode Fuzzy Hash: 6ec6813ecce97b8c5f8ee7286da0a406d2e520b2b9e2182cb652e457f991f352
                                              • Instruction Fuzzy Hash: 5D2139B18002598FDB10DF9AD984BEEFBF4AF49320F24845AE859B3350D778A944CF61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2003 683ab90-683ac2c DuplicateHandle 2004 683ac35-683ac52 2003->2004 2005 683ac2e-683ac34 2003->2005 2005->2004
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0683AC1F
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4497525280.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6830000_RegAsm.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 5867e5d96b3278545af5e69eb99f18e6a5deaf67b18b7c365c5491650677aa89
                                              • Instruction ID: 98fa8115163e6f4f76ddb89487a39e353a54b78b8fc3f37b1b9ed7469a0ff8a5
                                              • Opcode Fuzzy Hash: 5867e5d96b3278545af5e69eb99f18e6a5deaf67b18b7c365c5491650677aa89
                                              • Instruction Fuzzy Hash: 5721E2B5D002589FDB10CFAAD984AEEBBF5EF48310F14841AE958A3350D378A955CFA1
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0683AC1F
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4497525280.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6830000_RegAsm.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 43eaf35cbb3248559dc0b62a94de8ed4d05059b0f40655c262b9f8fae6b546a7
                                              • Instruction ID: 45b53c3a0887d3fbf218926b38ae2117dcccfb20a1f08200c7e5fca5adcce799
                                              • Opcode Fuzzy Hash: 43eaf35cbb3248559dc0b62a94de8ed4d05059b0f40655c262b9f8fae6b546a7
                                              • Instruction Fuzzy Hash: F021E4B59002489FDB10CF9AD984ADEBBF4EB48310F14841AE918A3310D378A944CFA1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4495307090.0000000002D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D0D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_2d0d000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2f226aab7161dd2bf5a8903652870f512660c293af9f4447da6923eeacf52acb
                                              • Instruction ID: 3c66b007fdd6e99f030b69e60baf7f0bbb5f447c2357f5a7c5a8565aef15e43f
                                              • Opcode Fuzzy Hash: 2f226aab7161dd2bf5a8903652870f512660c293af9f4447da6923eeacf52acb
                                              • Instruction Fuzzy Hash: F1210071604200DFDB14CF64D9C0F26BB66EB84314F30C56AD84E4B3A6C33AD806CA62
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4495307090.0000000002D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D0D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_2d0d000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f5701a9043aa553e81718a3cb2b46362aa74ba59eb49cd1fa4414ef9d42198f1
                                              • Instruction ID: aa202c94f4ebd09e44280704353b773a1a3dee707163bf84e74ff8e0f49f7a4b
                                              • Opcode Fuzzy Hash: f5701a9043aa553e81718a3cb2b46362aa74ba59eb49cd1fa4414ef9d42198f1
                                              • Instruction Fuzzy Hash: 232180755093C08FCB12CF24D9D4B15BF71EB46214F28C5DBD8898B6A7C33A984ACB62
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4497525280.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6830000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                              • API String ID: 0-2843079600
                                              • Opcode ID: 164e575eef77031537f276d312c104dc587a90e5709e7f827a9cac8b3d66d8a4
                                              • Instruction ID: 4c75361e203a155a5ac29199699e94030bd3aa6d35692aa432b37d5bedb91ab3
                                              • Opcode Fuzzy Hash: 164e575eef77031537f276d312c104dc587a90e5709e7f827a9cac8b3d66d8a4
                                              • Instruction Fuzzy Hash: B7122A30A00269CFDB68DF69C894AADB7B2FF89304F208569D509EB364DB349D45CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.4495596329.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_2d50000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \V6m
                                              • API String ID: 0-1924247956
                                              • Opcode ID: 388b363d915903ace2656a854c423c05faa95164dabd25d067a8657e4348d3ba
                                              • Instruction ID: 23a32c37a951aa49f5a1eff1be87630665cc404c0b796262eeb06f3609160e9b
                                              • Opcode Fuzzy Hash: 388b363d915903ace2656a854c423c05faa95164dabd25d067a8657e4348d3ba
                                              • Instruction Fuzzy Hash: 79B16E70E00229CFDF10CFA9D98579DBBF2AF88318F148129D855A7354EBB49C85CB92