Loading ...

Play interactive tourEdit tour

Analysis Report http://covid19vaccine.hopto.org/march%20OG.exe

Overview

General Information

Sample URL:http://covid19vaccine.hopto.org/march%20OG.exe
Analysis ID:365439
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
PE file contains strange resources
Potential browser exploit detected (process start blacklist hit)
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 4340 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4436 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4340 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
    • march OG.exe (PID: 4844 cmdline: 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe' MD5: B75B990AC5990F1B6B0127540DE4EC30)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
Process Memory Space: march OG.exe PID: 4844JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
    Process Memory Space: march OG.exe PID: 4844JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus / Scanner detection for submitted sampleShow sources
      Source: http://covid19vaccine.hopto.org/march%20OG.exeAvira URL Cloud: detection malicious, Label: malware
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partialMetadefender: Detection: 24%Perma Link
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partialReversingLabs: Detection: 82%
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\march%20OG[1].exeMetadefender: Detection: 24%Perma Link
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\march%20OG[1].exeReversingLabs: Detection: 82%
      Multi AV Scanner detection for submitted fileShow sources
      Source: http://covid19vaccine.hopto.org/march%20OG.exeVirustotal: Detection: 17%Perma Link
      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeJump to behavior
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 09 Mar 2021 14:38:11 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/8.0.2Last-Modified: Wed, 03 Mar 2021 00:26:30 GMTETag: "17000-5bc96e70c1a4b"Accept-Ranges: bytesContent-Length: 94208Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 8c 5d 2f 4d 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 40 01 00 00 30 00 00 00 00 00 00 14 17 00 00 00 10 00 00 00 50 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 80 01 00 00 10 00 00 67 77 01 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f4 46 01 00 28 00 00 00 00 70 01 00 ac 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 90 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 2c 3d 01 00 00 10 00 00 00 40 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 08 12 00 00 00 50 01 00 00 10 00 00 00 50 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 ac 09 00 00 00 70 01 00 00 10 00 00 00 60 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Source: global trafficHTTP traffic detected: GET /march%20OG.exe HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: covid19vaccine.hopto.orgConnection: Keep-Alive
      Source: unknownDNS traffic detected: queries for: covid19vaccine.hopto.org
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_02106A72 NtProtectVirtualMemory,16_2_02106A72
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_0040A0CB16_2_0040A0CB
      Source: march%20OG[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: march OG.exe.l6tc81k.partial.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: classification engineClassification label: mal88.troj.evad.win@5/9@1/1
      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{813E1F67-8130-11EB-90E6-ECF4BB82F7E0}.datJump to behavior
      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DF27A6466E5B9B4110.TMPJump to behavior
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
      Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
      Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4340 CREDAT:17410 /prefetch:2
      Source: unknownProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe'
      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4340 CREDAT:17410 /prefetch:2Jump to behavior
      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe' Jump to behavior
      Source: C:\Program Files\internet explorer\iexplore.exeAutomated click: Run
      Source: C:\Program Files\internet explorer\iexplore.exeAutomated click: Run
      Source: C:\Program Files\internet explorer\iexplore.exeAutomated click: Run
      Source: C:\Program Files\internet explorer\iexplore.exeAutomated click: Run
      Source: C:\Program Files\internet explorer\iexplore.exeAutomated click: Run
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: Process Memory Space: march OG.exe PID: 4844, type: MEMORY
      Yara detected VB6 Downloader GenericShow sources
      Source: Yara matchFile source: Process Memory Space: march OG.exe PID: 4844, type: MEMORY
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_0040A0CB pushfd ; retn 2B2Fh16_2_0040A0CA
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_004070BF push esi; retf 16_2_004070C0
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_00403B43 push cs; retf 16_2_00403B91
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_00409B29 push eax; retf 16_2_00409B34
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_00403B94 push cs; retf 16_2_00403B91
      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partialJump to dropped file
      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\march%20OG[1].exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion:

      barindex
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeRDTSC instruction interceptor: First address: 0000000002105A4C second address: 00000000021059D3 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FC40CA30608h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d test dx, A4B7h 0x00000022 test bl, FFFFFFE9h 0x00000025 add edi, edx 0x00000027 jmp 00007FC40CA3061Eh 0x00000029 pushad 0x0000002a mov edi, 00000097h 0x0000002f rdtsc
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeRDTSC instruction interceptor: First address: 00000000021059EC second address: 0000000002105A8B instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp edi, 00E4E1C0h 0x00000010 jnl 00007FC40CA30592h 0x00000012 test dh, ch 0x00000014 ret 0x00000015 cmp dx, B20Dh 0x0000001a test dh, ah 0x0000001c mov dword ptr [ebp+0000009Ch], 00000000h 0x00000026 test dl, bl 0x00000028 xor edi, edi 0x0000002a cmp dh, dh 0x0000002c cmp bx, ax 0x0000002f mov ecx, 000186A0h 0x00000034 push ecx 0x00000035 jmp 00007FC40CA3061Ah 0x00000037 cmp eax, eax 0x00000039 call 00007FC40CA30697h 0x0000003e call 00007FC40CA30764h 0x00000043 lfence 0x00000046 rdtsc
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: march OG.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeRDTSC instruction interceptor: First address: 0000000002105A4C second address: 00000000021059D3 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FC40CA30608h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d test dx, A4B7h 0x00000022 test bl, FFFFFFE9h 0x00000025 add edi, edx 0x00000027 jmp 00007FC40CA3061Eh 0x00000029 pushad 0x0000002a mov edi, 00000097h 0x0000002f rdtsc
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeRDTSC instruction interceptor: First address: 00000000021059D3 second address: 00000000021059D3 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 dec dword ptr [ebp+000000F8h] 0x00000009 nop 0x0000000a cmp dword ptr [ebp+000000F8h], 00000000h 0x00000011 jne 00007FC40CA305FCh 0x00000013 call 00007FC40CA306E4h 0x00000018 call 00007FC40CA30658h 0x0000001d lfence 0x00000020 mov edx, dword ptr [7FFE0014h] 0x00000026 lfence 0x00000029 ret 0x0000002a mov esi, edx 0x0000002c pushad 0x0000002d nop 0x0000002e nop 0x0000002f xor eax, eax 0x00000031 inc eax 0x00000032 nop 0x00000033 nop 0x00000034 popad 0x00000035 mov edx, 00000001h 0x0000003a nop 0x0000003b nop 0x0000003c ret 0x0000003d test dx, A4B7h 0x00000042 test bl, FFFFFFE9h 0x00000045 add edi, edx 0x00000047 jmp 00007FC40CA3065Eh 0x00000049 pushad 0x0000004a mov edi, 00000097h 0x0000004f rdtsc
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeRDTSC instruction interceptor: First address: 00000000021059EC second address: 0000000002105A8B instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp edi, 00E4E1C0h 0x00000010 jnl 00007FC40CA30592h 0x00000012 test dh, ch 0x00000014 ret 0x00000015 cmp dx, B20Dh 0x0000001a test dh, ah 0x0000001c mov dword ptr [ebp+0000009Ch], 00000000h 0x00000026 test dl, bl 0x00000028 xor edi, edi 0x0000002a cmp dh, dh 0x0000002c cmp bx, ax 0x0000002f mov ecx, 000186A0h 0x00000034 push ecx 0x00000035 jmp 00007FC40CA3061Ah 0x00000037 cmp eax, eax 0x00000039 call 00007FC40CA30697h 0x0000003e call 00007FC40CA30764h 0x00000043 lfence 0x00000046 rdtsc
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeRDTSC instruction interceptor: First address: 0000000002105A8B second address: 0000000002105A8B instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FC40CA30BCDh 0x0000001d popad 0x0000001e call 00007FC40CA3078Ch 0x00000023 lfence 0x00000026 rdtsc
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_02102230 rdtsc 16_2_02102230
      Source: march OG.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_02102230 rdtsc 16_2_02102230
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_02102230 mov eax, dword ptr fs:[00000030h]16_2_02102230
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_02102254 mov eax, dword ptr fs:[00000030h]16_2_02102254
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_02102ED0 mov eax, dword ptr fs:[00000030h]16_2_02102ED0
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_0210574D mov eax, dword ptr fs:[00000030h]16_2_0210574D
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_02106071 mov eax, dword ptr fs:[00000030h]16_2_02106071
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_02101CDA mov eax, dword ptr fs:[00000030h]16_2_02101CDA
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_021060DD mov eax, dword ptr fs:[00000030h]16_2_021060DD
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_021060FB mov eax, dword ptr fs:[00000030h]16_2_021060FB
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_021051D5 mov eax, dword ptr fs:[00000030h]16_2_021051D5
      Source: march OG.exe, 00000010.00000002.492079328.0000000000C80000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
      Source: march OG.exe, 00000010.00000002.492079328.0000000000C80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: march OG.exe, 00000010.00000002.492079328.0000000000C80000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: march OG.exe, 00000010.00000002.492079328.0000000000C80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exeCode function: 16_2_02103D0A cpuid 16_2_02103D0A

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsExploitation for Client Execution1Path InterceptionProcess Injection2Masquerading1OS Credential DumpingSecurity Software Discovery411Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection2LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery211Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      http://covid19vaccine.hopto.org/march%20OG.exe18%VirustotalBrowse
      http://covid19vaccine.hopto.org/march%20OG.exe100%Avira URL Cloudmalware

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partial24%MetadefenderBrowse
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partial82%ReversingLabsWin32.Trojan.VBObfuse
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\march%20OG[1].exe24%MetadefenderBrowse
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\march%20OG[1].exe82%ReversingLabsWin32.Trojan.VBObfuse

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      covid19vaccine.hopto.org
      46.183.222.6
      truefalse
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        http://covid19vaccine.hopto.org/march%20OG.exetrue
          unknown
          0true
            low

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            46.183.222.6
            covid19vaccine.hopto.orgLatvia
            52048DATACLUBLVfalse

            General Information

            Joe Sandbox Version:31.0.0 Emerald
            Analysis ID:365439
            Start date:09.03.2021
            Start time:15:37:23
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 5m 22s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:browseurl.jbs
            Sample URL:http://covid19vaccine.hopto.org/march%20OG.exe
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:27
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal88.troj.evad.win@5/9@1/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 92.122.145.220, 104.108.39.131, 23.57.80.111, 13.64.90.137, 51.104.144.132, 152.199.19.161, 104.42.151.234, 2.20.142.210, 2.20.142.209, 51.103.5.186, 40.88.32.150, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.54.26.129, 13.88.21.125, 168.61.161.212
            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, wns.notify.trafficmanager.net, go.microsoft.com, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, ie9comview.vo.msecnd.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus17.cloudapp.net, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, go.microsoft.com.edgekey.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net, vip2-par02p.wns.notify.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, cs9.wpc.v0cdn.net

            Simulations

            Behavior and APIs

            No simulations

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{813E1F67-8130-11EB-90E6-ECF4BB82F7E0}.dat
            Process:C:\Program Files\internet explorer\iexplore.exe
            File Type:Microsoft Word Document
            Category:dropped
            Size (bytes):32344
            Entropy (8bit):1.7940541219870676
            Encrypted:false
            SSDEEP:192:rUZbZ22KWXt0if6j9zM61BPv/k1WAl5p2:rENNJ9Jn80o
            MD5:C6362859B5CB475AADB05A8FF8A63B82
            SHA1:197324A4CCE901D243928ED5ABA0E0311E2DFF0D
            SHA-256:EE4D461DBE6EE3B57F9AEB3BC792EA6543A18D018B42B52CC917D24E6629332E
            SHA-512:6A48B3D6B62D5DE0BF6C531B2538E125981B741AD8520A60D2BA6DAB2478C174D63A71ECB832F69529AC73FD6D38946B06B13B28C1E068D968267548C501ADB8
            Malicious:false
            Reputation:low
            Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{813E1F69-8130-11EB-90E6-ECF4BB82F7E0}.dat
            Process:C:\Program Files\internet explorer\iexplore.exe
            File Type:Microsoft Word Document
            Category:dropped
            Size (bytes):19032
            Entropy (8bit):1.599271845016993
            Encrypted:false
            SSDEEP:48:IwEGcprdGwpaxG4pQOGrapbSsGQpBGGHHpc3TGUpQweGcpm:rYZHQj6ABSkjF2B6vg
            MD5:80481B7A27B1D6C0DEF3782C8DE52A26
            SHA1:EC36C5CDABB593C404B5F3908A18029A893B04F4
            SHA-256:DBF8D767C2220C5B9EB6A760EBD206A7A5F8A6515C5CF652E6A9FF5BE690C90C
            SHA-512:8972A04D820B5E433E8B197EC5BF266E3C5B63CD8C43F321826A02189A8B3EA851726BA8298F5CBB3CB11EA980C3AE486EED27280F009E1705BDAA35B8FCC251
            Malicious:false
            Reputation:low
            Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partial
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):94208
            Entropy (8bit):5.559510350020854
            Encrypted:false
            SSDEEP:1536:61oJy7aGTvIaUZNcddsm3dE+WE2i5JjyI+h91mR4E:6v7aGTUcddaMrjyIA1jE
            MD5:B75B990AC5990F1B6B0127540DE4EC30
            SHA1:66DD5A9D359FAF4ABDFF9B53B8E96280EFF58038
            SHA-256:F7ABA1C5E66938EFC7A722F98344A70A2443391668283F08DA1202BDE6C9B925
            SHA-512:E2009B8E6AD35C60F08EFB6514C18C650929F343B01A14F2AAB8D5EAEC880520C67BCF6795ED21BE8C462A2C32EB31E80A7A3A1C9767776CE18F208B4F89FF45
            Malicious:true
            Antivirus:
            • Antivirus: Metadefender, Detection: 24%, Browse
            • Antivirus: ReversingLabs, Detection: 82%
            Reputation:low
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L....]/M.................@...0...............P....@.................................gw.......................................F..(....p......................................................................(... ....................................text...,=.......@.................. ..`.data........P.......P..............@....rsrc........p.......`..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partial:Zone.Identifier
            Process:C:\Program Files\internet explorer\iexplore.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:gAWY3n:qY3n
            MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
            SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
            SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
            SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
            Malicious:false
            Reputation:low
            Preview: [ZoneTransfer]..ZoneId=3..
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe:Zone.Identifier
            Process:C:\Program Files\internet explorer\iexplore.exe
            File Type:very short file (no magic)
            Category:modified
            Size (bytes):1
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3:W:W
            MD5:ECCBC87E4B5CE2FE28308FD9F2A7BAF3
            SHA1:77DE68DAECD823BABBB58EDB1C8E14D7106E83BB
            SHA-256:4E07408562BEDB8B60CE05C1DECFE3AD16B72230967DE01F640B7E4729B49FCE
            SHA-512:3BAFBF08882A2D10133093A1B8433F50563B93C14ACD05B79028EB1D12799027241450980651994501423A66C276AE26C43B739BC65C4E16B10C3AF6C202AEBB
            Malicious:false
            Reputation:low
            Preview: 3
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\march%20OG[1].exe
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):94208
            Entropy (8bit):5.559510350020854
            Encrypted:false
            SSDEEP:1536:61oJy7aGTvIaUZNcddsm3dE+WE2i5JjyI+h91mR4E:6v7aGTUcddaMrjyIA1jE
            MD5:B75B990AC5990F1B6B0127540DE4EC30
            SHA1:66DD5A9D359FAF4ABDFF9B53B8E96280EFF58038
            SHA-256:F7ABA1C5E66938EFC7A722F98344A70A2443391668283F08DA1202BDE6C9B925
            SHA-512:E2009B8E6AD35C60F08EFB6514C18C650929F343B01A14F2AAB8D5EAEC880520C67BCF6795ED21BE8C462A2C32EB31E80A7A3A1C9767776CE18F208B4F89FF45
            Malicious:true
            Antivirus:
            • Antivirus: Metadefender, Detection: 24%, Browse
            • Antivirus: ReversingLabs, Detection: 82%
            Reputation:low
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L....]/M.................@...0...............P....@.................................gw.......................................F..(....p......................................................................(... ....................................text...,=.......@.................. ..`.data........P.......P..............@....rsrc........p.......`..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:ASCII text, with CRLF line terminators
            Category:modified
            Size (bytes):89
            Entropy (8bit):4.366670544419046
            Encrypted:false
            SSDEEP:3:oVXU0NFUNW8JOGXnE0NFpULun:o9UoqEqUC
            MD5:967DEE776D313F3030F12D257AC94577
            SHA1:AC966037240676B799CDF5FE28716255C1B4303B
            SHA-256:DF6ACB284F6483CE0D3914A5A0985D7F0DC1613DE0F645F6A982F8D109F284F3
            SHA-512:17F91D81F08AF61C7C94490399F09D3F6FE89E1C895DD7E685050026CB017AF48C264A689713FE529740B9EA8F174605E20A7AECF054C767BBEB25F2BDBE8614
            Malicious:false
            Reputation:low
            Preview: [2021/03/09 15:38:11.105] Latest deploy version: ..[2021/03/09 15:38:11.105] 11.211.2 ..
            C:\Users\user\AppData\Local\Temp\~DF27A6466E5B9B4110.TMP
            Process:C:\Program Files\internet explorer\iexplore.exe
            File Type:data
            Category:dropped
            Size (bytes):12981
            Entropy (8bit):0.4430559335601269
            Encrypted:false
            SSDEEP:12:c9lCg5/9lCgeK9l26an9l26an9l8fR+k9l8fR+09lTq+CVduiryUuNsqNxrt:c9lLh9lLh9lIn9lIn9loL9loL9lWjDoZ
            MD5:1895B7B06EBF1C0546E5EFA39D637A9D
            SHA1:3FC35A4F370B898F686C0B48A1FEBC564772E619
            SHA-256:C94BD6E9E78D006EFC4EDCFDEA87C15220EFA0DBEFC9371A4857BF2B8F1AEDB6
            SHA-512:8A9EE4BFE5AD0632B4E2A81390D64EBBF917C8BBC2660722D21D9D9EFB9CF32849F2814E642C728ED01AD78A79407D5E21C0B2E1D7FA9F63FE26D1E2B9C3EE82
            Malicious:false
            Reputation:low
            Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Temp\~DF761A8E80D89A84E5.TMP
            Process:C:\Program Files\internet explorer\iexplore.exe
            File Type:data
            Category:dropped
            Size (bytes):29989
            Entropy (8bit):0.3309272852524987
            Encrypted:false
            SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwTK/9lwTi9l2Tc/9l2d:kBqoxKAuvScS+B/I+hwy
            MD5:F5EBE47B4CE8A5D9978C360417688828
            SHA1:1D3A7AE1BD8B90F828A0EC66CB23A58CA2AB2AEE
            SHA-256:FE4D22A9CDA7116C1FF6417B55D84C78FBA5C5A6415D8495E79FD1ED59A8BB42
            SHA-512:2DA20731BA721409FA74CD8F14755B90A0BA4F7990CA41A966BB1E70A8BE80B2BB5A79BE9DE9929B2635B1846DF2659E78BB2EAC28800F3691E3ABC4E1C26FF4
            Malicious:false
            Reputation:low
            Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

            Static File Info

            No static file info

            Network Behavior

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Mar 9, 2021 15:38:12.546500921 CET4970080192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.546504021 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.614873886 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.615099907 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.615778923 CET804970046.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.616731882 CET4970080192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.622627020 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.690965891 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.691025019 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.691123962 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.691157103 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.758311033 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.758338928 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.758357048 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.758373976 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.758438110 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.825692892 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.825736046 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.825762033 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.825787067 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.825809956 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.825817108 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.825834990 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.825859070 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.825881004 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.825892925 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.825932980 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.893600941 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893641949 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893672943 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893692970 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893712044 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.893722057 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893745899 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893762112 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.893768072 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893790960 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893812895 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893824100 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.893841028 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893851995 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.893874884 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893897057 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.893908024 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893909931 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.893934011 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.893939018 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893963099 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893965960 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.893985033 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.893997908 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.894006968 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.894016981 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.894043922 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.894073963 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.961520910 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961580992 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961627007 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961630106 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.961657047 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.961683989 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961688042 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.961740017 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961755991 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.961796045 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961810112 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.961839914 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961857080 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.961874008 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961884975 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.961909056 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961924076 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.961945057 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961987019 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.961992025 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962029934 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962038994 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962080956 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962083101 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962135077 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962150097 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962188005 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962193012 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962229013 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962235928 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962265968 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962272882 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962302923 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962325096 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962344885 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962351084 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962383032 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962388992 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962418079 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962434053 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962452888 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962466955 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962505102 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962503910 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962558031 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962562084 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962608099 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962642908 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962649107 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962661028 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962693930 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962697029 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962732077 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962744951 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962766886 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962783098 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962802887 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962815046 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962838888 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962853909 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962888956 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:12.962888956 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:12.962941885 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:13.030400038 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:13.030459881 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:13.030502081 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:13.030540943 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:13.030580997 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:13.030628920 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:13.030673981 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:13.030713081 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:13.030750036 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:13.031100988 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:18.177714109 CET804969946.183.222.6192.168.2.7
            Mar 9, 2021 15:38:18.182138920 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:24.340822935 CET4969980192.168.2.746.183.222.6
            Mar 9, 2021 15:38:24.393989086 CET4970080192.168.2.746.183.222.6
            Mar 9, 2021 15:38:24.425024986 CET804969946.183.222.6192.168.2.7

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Mar 9, 2021 15:38:04.209747076 CET6050153192.168.2.78.8.8.8
            Mar 9, 2021 15:38:04.268192053 CET53605018.8.8.8192.168.2.7
            Mar 9, 2021 15:38:11.293840885 CET5377553192.168.2.78.8.8.8
            Mar 9, 2021 15:38:11.350908995 CET53537758.8.8.8192.168.2.7
            Mar 9, 2021 15:38:12.472520113 CET5183753192.168.2.78.8.8.8
            Mar 9, 2021 15:38:12.534859896 CET53518378.8.8.8192.168.2.7
            Mar 9, 2021 15:38:30.674083948 CET5541153192.168.2.78.8.8.8
            Mar 9, 2021 15:38:30.732253075 CET53554118.8.8.8192.168.2.7
            Mar 9, 2021 15:38:33.830120087 CET6366853192.168.2.78.8.8.8
            Mar 9, 2021 15:38:33.876199007 CET53636688.8.8.8192.168.2.7
            Mar 9, 2021 15:38:41.172713995 CET5464053192.168.2.78.8.8.8
            Mar 9, 2021 15:38:41.219281912 CET53546408.8.8.8192.168.2.7
            Mar 9, 2021 15:38:41.298634052 CET5873953192.168.2.78.8.8.8
            Mar 9, 2021 15:38:41.345556021 CET53587398.8.8.8192.168.2.7
            Mar 9, 2021 15:38:42.301479101 CET5873953192.168.2.78.8.8.8
            Mar 9, 2021 15:38:42.348711967 CET53587398.8.8.8192.168.2.7
            Mar 9, 2021 15:38:43.330921888 CET5873953192.168.2.78.8.8.8
            Mar 9, 2021 15:38:43.376823902 CET53587398.8.8.8192.168.2.7
            Mar 9, 2021 15:38:45.346986055 CET5873953192.168.2.78.8.8.8
            Mar 9, 2021 15:38:45.392901897 CET53587398.8.8.8192.168.2.7
            Mar 9, 2021 15:38:49.363078117 CET5873953192.168.2.78.8.8.8
            Mar 9, 2021 15:38:49.409126997 CET53587398.8.8.8192.168.2.7
            Mar 9, 2021 15:38:54.034775019 CET6033853192.168.2.78.8.8.8
            Mar 9, 2021 15:38:54.080661058 CET53603388.8.8.8192.168.2.7
            Mar 9, 2021 15:38:59.562648058 CET5871753192.168.2.78.8.8.8
            Mar 9, 2021 15:38:59.619684935 CET53587178.8.8.8192.168.2.7
            Mar 9, 2021 15:39:02.104366064 CET5976253192.168.2.78.8.8.8
            Mar 9, 2021 15:39:02.159679890 CET53597628.8.8.8192.168.2.7
            Mar 9, 2021 15:39:02.893915892 CET5432953192.168.2.78.8.8.8
            Mar 9, 2021 15:39:02.940005064 CET53543298.8.8.8192.168.2.7
            Mar 9, 2021 15:39:26.152199030 CET5805253192.168.2.78.8.8.8
            Mar 9, 2021 15:39:26.207998991 CET53580528.8.8.8192.168.2.7
            Mar 9, 2021 15:39:33.796916008 CET5400853192.168.2.78.8.8.8
            Mar 9, 2021 15:39:33.851068974 CET53540088.8.8.8192.168.2.7
            Mar 9, 2021 15:39:44.002993107 CET5945153192.168.2.78.8.8.8
            Mar 9, 2021 15:39:44.072282076 CET53594518.8.8.8192.168.2.7
            Mar 9, 2021 15:39:44.924587965 CET5291453192.168.2.78.8.8.8
            Mar 9, 2021 15:39:44.981726885 CET53529148.8.8.8192.168.2.7
            Mar 9, 2021 15:39:46.029555082 CET6456953192.168.2.78.8.8.8
            Mar 9, 2021 15:39:46.084809065 CET53645698.8.8.8192.168.2.7
            Mar 9, 2021 15:39:47.728049994 CET5281653192.168.2.78.8.8.8
            Mar 9, 2021 15:39:47.805243015 CET53528168.8.8.8192.168.2.7
            Mar 9, 2021 15:39:48.353799105 CET5078153192.168.2.78.8.8.8
            Mar 9, 2021 15:39:48.411199093 CET53507818.8.8.8192.168.2.7
            Mar 9, 2021 15:39:49.070045948 CET5423053192.168.2.78.8.8.8
            Mar 9, 2021 15:39:49.117367029 CET53542308.8.8.8192.168.2.7
            Mar 9, 2021 15:39:49.791652918 CET5491153192.168.2.78.8.8.8
            Mar 9, 2021 15:39:49.846575975 CET53549118.8.8.8192.168.2.7
            Mar 9, 2021 15:39:51.306799889 CET4995853192.168.2.78.8.8.8
            Mar 9, 2021 15:39:51.363261938 CET53499588.8.8.8192.168.2.7
            Mar 9, 2021 15:39:52.744709969 CET5086053192.168.2.78.8.8.8
            Mar 9, 2021 15:39:52.801925898 CET53508608.8.8.8192.168.2.7
            Mar 9, 2021 15:39:53.230261087 CET5045253192.168.2.78.8.8.8
            Mar 9, 2021 15:39:53.286919117 CET53504528.8.8.8192.168.2.7
            Mar 9, 2021 15:39:53.457514048 CET5973053192.168.2.78.8.8.8
            Mar 9, 2021 15:39:53.525835991 CET53597308.8.8.8192.168.2.7
            Mar 9, 2021 15:40:06.724911928 CET5931053192.168.2.78.8.8.8
            Mar 9, 2021 15:40:06.773703098 CET53593108.8.8.8192.168.2.7
            Mar 9, 2021 15:40:11.621453047 CET5191953192.168.2.78.8.8.8
            Mar 9, 2021 15:40:11.667619944 CET53519198.8.8.8192.168.2.7
            Mar 9, 2021 15:40:22.522402048 CET6429653192.168.2.78.8.8.8
            Mar 9, 2021 15:40:22.568308115 CET53642968.8.8.8192.168.2.7
            Mar 9, 2021 15:40:24.529536009 CET5668053192.168.2.78.8.8.8
            Mar 9, 2021 15:40:24.586733103 CET53566808.8.8.8192.168.2.7

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Mar 9, 2021 15:38:12.472520113 CET192.168.2.78.8.8.80xe69eStandard query (0)covid19vaccine.hopto.orgA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Mar 9, 2021 15:38:12.534859896 CET8.8.8.8192.168.2.70xe69eNo error (0)covid19vaccine.hopto.org46.183.222.6A (IP address)IN (0x0001)

            HTTP Request Dependency Graph

            • covid19vaccine.hopto.org

            HTTP Packets

            Session IDSource IPSource PortDestination IPDestination PortProcess
            0192.168.2.74969946.183.222.680C:\Program Files (x86)\Internet Explorer\iexplore.exe
            TimestampkBytes transferredDirectionData
            Mar 9, 2021 15:38:12.622627020 CET915OUTGET /march%20OG.exe HTTP/1.1
            Accept: text/html, application/xhtml+xml, image/jxr, */*
            Accept-Language: en-US
            User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
            Accept-Encoding: gzip, deflate
            Host: covid19vaccine.hopto.org
            Connection: Keep-Alive
            Mar 9, 2021 15:38:12.690965891 CET917INHTTP/1.1 200 OK
            Date: Tue, 09 Mar 2021 14:38:11 GMT
            Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/8.0.2
            Last-Modified: Wed, 03 Mar 2021 00:26:30 GMT
            ETag: "17000-5bc96e70c1a4b"
            Accept-Ranges: bytes
            Content-Length: 94208
            Keep-Alive: timeout=5, max=100
            Connection: Keep-Alive
            Content-Type: application/x-msdownload
            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 8c 5d 2f 4d 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 40 01 00 00 30 00 00 00 00 00 00 14 17 00 00 00 10 00 00 00 50 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 80 01 00 00 10 00 00 67 77 01 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f4 46 01 00 28 00 00 00 00 70 01 00 ac 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 90 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 2c 3d 01 00 00 10 00 00 00 40 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 08 12 00 00 00 50 01 00 00 10 00 00 00 50 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 ac 09 00 00 00 70 01 00 00 10 00 00 00 60 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$#BBBL^B`BdBRichBPEL]/M@0P@gwF(p( .text,=@ `.dataPP@.rsrcp`@@IMSVBVM60.DLL
            Mar 9, 2021 15:38:12.691025019 CET918INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Mar 9, 2021 15:38:12.758311033 CET919INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Mar 9, 2021 15:38:12.758338928 CET921INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Mar 9, 2021 15:38:12.758357048 CET922INData Raw: 07 00 08 00 e4 2a 41 00 f5 2a 41 00 ec 2a 41 00 04 00 04 00 00 00 00 00 00 00 00 00 91 2c 41 00 06 00 04 00 00 00 00 00 84 2d 41 00 7b 2d 41 00 06 00 04 00 00 00 00 00 b1 2e 41 00 a8 2e 41 00 07 00 08 00 3b 30 41 00 5d 30 41 00 42 30 41 00 07 00
            Data Ascii: *A*A*A,A-A{-A.A.A;0A]0AB0A1A1A1A2A2A2A75A>5A";A:A*=Ad=A2=A>A>A@A@A@AAABAlCACAtCA(DADA
            Mar 9, 2021 15:38:12.758373976 CET924INData Raw: af 05 3b 01 0c 08 00 53 75 62 73 74 61 6e 38 00 13 00 00 ff 03 4f 00 00 00 07 05 00 44 61 74 61 31 00 25 02 20 0d 88 0e 74 04 2c 01 12 0c 00 41 00 63 00 63 00 65 00 73 00 73 00 20 00 32 00 30 00 30 00 30 00 3b 00 13 00 00 16 00 17 00 18 00 00 19
            Data Ascii: ;Substan8OData1% t,Access 2000;Data1%,-1@(@VB5!6&*~8@0 @@@ @xOPSGT
            Mar 9, 2021 15:38:12.825692892 CET925INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii: @@&@@T&@PA@@|'@@@@@&hl8 @lZAhN}bord'@'@@4'@
            Mar 9, 2021 15:38:12.825736046 CET926INData Raw: 00 00 00 00 00 00 e8 1f 40 00 74 1e 40 00 fa 16 40 00 00 17 40 00 06 17 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii: @t@@@@ @t@@@@l$l$Gl$Gl$
            Mar 9, 2021 15:38:12.825762033 CET928INData Raw: 6f 6e 32 00 3a 4f ad 33 99 66 cf 11 b7 0c 00 aa 00 60 d3 93 00 00 00 00 46 6f 72 6d 00 00 00 00 4f 70 74 69 6f 6e 33 00 f2 4e ad 33 99 66 cf 11 b7 0c 00 aa 00 60 d3 93 43 6f 6d 6d 61 6e 64 31 00 00 00 00 09 00 00 00 6b 65 72 6e 65 6c 33 32 00 00
            Data Ascii: on2:O3f`FormOption3N3f`Command1kernel32GetEnvironmentVariableA(@(@<SADSAth(@P@GetEnvironmentVarAlgys2udgivelsesdageneGinneyAGNISESbertasequator
            Mar 9, 2021 15:38:12.825787067 CET929INData Raw: ad 33 99 66 cf 11 b7 0c 00 aa 00 60 d3 93 12 00 00 00 54 00 72 00 69 00 6f 00 72 00 63 00 68 00 69 00 73 00 00 00 49 00 58 00 69 00 65 00 32 00 75 00 74 00 48 00 52 00 78 00 30 00 68 00 53 00 42 00 4c 00 72 00 6e 00 6c 00 32 00 6c 00 4d 00 34 00
            Data Ascii: 3f`TriorchisIXie2utHRx0hSBLrnl2lM4fNpqMGsjbukbu73oU84spisestelleneassFuWexospheres Marginalposition1
            Mar 9, 2021 15:38:12.825809956 CET930INData Raw: 6b 4f 62 6a 00 00 00 00 5f 5f 76 62 61 53 74 72 43 6f 70 79 00 00 00 00 5f 5f 76 62 61 45 72 72 6f 72 4f 76 65 72 66 6c 6f 77 00 00 5f 5f 76 62 61 53 74 72 43 61 74 00 5f 5f 76 62 61 49 6e 53 74 72 00 00 5f 5f 76 62 61 46 72 65 65 53 74 72 4c 69
            Data Ascii: kObj__vbaStrCopy__vbaErrorOverflow__vbaStrCat__vbaInStr__vbaFreeStrList__vbaStrToUnicode__vbaSetSystemError__vbaStrToAnsi__vbaFreeVarList__vbaStrVarMove__vbaStrMoveS_0>I*JMPCsKES6#Gc&


            Code Manipulations

            Statistics

            CPU Usage

            Click to jump to process

            Memory Usage

            Click to jump to process

            High Level Behavior Distribution

            Click to dive into process behavior distribution

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:15:38:09
            Start date:09/03/2021
            Path:C:\Program Files\internet explorer\iexplore.exe
            Wow64 process (32bit):false
            Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Imagebase:0x7ff6bb910000
            File size:823560 bytes
            MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low

            General

            Start time:15:38:10
            Start date:09/03/2021
            Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            Wow64 process (32bit):true
            Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4340 CREDAT:17410 /prefetch:2
            Imagebase:0xde0000
            File size:822536 bytes
            MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low

            General

            Start time:15:38:41
            Start date:09/03/2021
            Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe'
            Imagebase:0x400000
            File size:94208 bytes
            MD5 hash:B75B990AC5990F1B6B0127540DE4EC30
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Visual Basic
            Reputation:low

            Disassembly

            Code Analysis

            Reset < >

              Execution Graph

              Execution Coverage:9.1%
              Dynamic/Decrypted Code Coverage:1.5%
              Signature Coverage:0%
              Total number of Nodes:272
              Total number of Limit Nodes:78

              Graph

              execution_graph 8246 411f61 9 API calls 8247 4120d8 __vbaFreeObj __vbaFreeStr __vbaFreeVar __vbaFreeStr __vbaFreeVar 8246->8247 8248 41202e 8246->8248 8250 412052 8248->8250 8251 412037 __vbaNew2 8248->8251 8252 41205c __vbaCastObj __vbaObjSet 8250->8252 8251->8252 8253 412098 8252->8253 8254 4120c9 8253->8254 8255 4120a9 __vbaHresultCheckObj 8253->8255 8256 4120d0 __vbaFreeObj 8254->8256 8255->8256 8256->8247 8257 401714 #100 8258 401739 8257->8258 8259 40bcd4 8262 40fd8f 8259->8262 8261 40bcd9 8263 40fd90 8262->8263 8264 40fda0 __vbaNew2 8263->8264 8265 40fdbb __vbaObjSet 8263->8265 8264->8265 8267 40fe0c 8265->8267 8268 40fe40 8267->8268 8269 40fe1d __vbaHresultCheckObj 8267->8269 8270 40fe50 __vbaNew2 8268->8270 8271 40fe6b __vbaObjSet 8268->8271 8269->8268 8270->8271 8273 40feb9 8271->8273 8274 40feea 8273->8274 8275 40feca __vbaHresultCheckObj 8273->8275 8276 40ffcd 8274->8276 8277 40ffad __vbaHresultCheckObj 8274->8277 8275->8274 8278 40ffd4 __vbaVarMove __vbaFreeObjList __vbaFreeVarList __vbaStrCopy __vbaChkstk 8276->8278 8277->8278 8412 4135a5 __vbaChkstk __vbaVarDup __vbaStrCopy __vbaStrCopy 8278->8412 8279 4100bd __vbaFreeStr 8280 4100e9 __vbaObjSet 8279->8280 8281 4100ce __vbaNew2 8279->8281 8283 410137 8280->8283 8281->8280 8284 410148 __vbaHresultCheckObj 8283->8284 8285 41016b 8283->8285 8284->8285 8286 410196 __vbaObjSet 8285->8286 8287 41017b __vbaNew2 8285->8287 8289 4101e1 8286->8289 8287->8286 8290 4101f2 __vbaHresultCheckObj 8289->8290 8291 410215 8289->8291 8292 41021c __vbaLateIdCallLd 8290->8292 8291->8292 8293 410256 __vbaObjSet 8292->8293 8294 41023b __vbaNew2 8292->8294 8296 4102a7 8293->8296 8294->8293 8297 4102b8 __vbaHresultCheckObj 8296->8297 8298 4102db 8296->8298 8299 4102e2 __vbaLateIdCallLd 8297->8299 8298->8299 8300 410304 __vbaNew2 8299->8300 8301 41031f __vbaObjSet 8299->8301 8300->8301 8303 410370 8301->8303 8304 410381 __vbaHresultCheckObj 8303->8304 8305 4103a4 8303->8305 8306 4103ab __vbaLateIdCallLd 8304->8306 8305->8306 8307 4103e8 __vbaObjSet 8306->8307 8308 4103cd __vbaNew2 8306->8308 8310 410439 8307->8310 8308->8307 8311 41044a __vbaHresultCheckObj 8310->8311 8312 41046d 8310->8312 8313 410474 __vbaI4Var __vbaI4Var __vbaStrVarMove __vbaStrMove 8311->8313 8312->8313 8314 41050f 8313->8314 8315 41053e 8314->8315 8316 41051e __vbaHresultCheckObj 8314->8316 8317 410545 __vbaFreeStr __vbaFreeObjList __vbaFreeVarList 8315->8317 8316->8317 8318 4105ba 8317->8318 8319 4105c9 __vbaHresultCheckObj 8318->8319 8320 4105e9 8318->8320 8319->8320 8321 410685 8320->8321 8322 410665 __vbaHresultCheckObj 8320->8322 8323 4106c7 8321->8323 8324 4112a9 __vbaFreeVar 8321->8324 8322->8321 8325 4106d0 __vbaNew2 8323->8325 8326 4106eb __vbaObjSet 8323->8326 8324->8261 8325->8326 8329 410736 8326->8329 8330 410747 __vbaHresultCheckObj 8329->8330 8331 41076a 8329->8331 8330->8331 8332 410795 __vbaObjSet 8331->8332 8333 41077a __vbaNew2 8331->8333 8335 4107e3 8332->8335 8333->8332 8336 4107f4 __vbaHresultCheckObj 8335->8336 8337 410817 8335->8337 8338 41081e __vbaVarDup 8336->8338 8337->8338 8339 4108d2 __vbaFreeObjList __vbaFreeVarList 8338->8339 8340 410927 __vbaObjSet 8339->8340 8341 41090c __vbaNew2 8339->8341 8343 410972 8340->8343 8341->8340 8344 410983 __vbaHresultCheckObj 8343->8344 8345 4109a6 8343->8345 8346 4109ad __vbaLateIdCallLd 8344->8346 8345->8346 8347 4109e7 __vbaObjSet 8346->8347 8348 4109cc __vbaNew2 8346->8348 8350 410a35 8347->8350 8348->8347 8351 410a46 __vbaHresultCheckObj 8350->8351 8352 410a69 8350->8352 8353 410a70 __vbaLateIdCallLd 8351->8353 8352->8353 8354 410a92 __vbaNew2 8353->8354 8355 410aad __vbaObjSet 8353->8355 8354->8355 8357 410afe 8355->8357 8358 410b32 8357->8358 8359 410b0f __vbaHresultCheckObj 8357->8359 8360 410b42 __vbaNew2 8358->8360 8361 410b5d __vbaObjSet 8358->8361 8359->8358 8360->8361 8363 410bab 8361->8363 8364 410bdc 8363->8364 8365 410bbc __vbaHresultCheckObj 8363->8365 8366 410be3 __vbaStrVarMove __vbaStrMove __vbaI4Var __vbaChkstk __vbaChkstk 8364->8366 8365->8366 8367 410cba 8366->8367 8368 410ce9 8367->8368 8369 410cc9 __vbaHresultCheckObj 8367->8369 8370 410cf0 __vbaFreeStr __vbaFreeObjList __vbaFreeVarList 8368->8370 8369->8370 8371 410d60 8370->8371 8372 410d8f 8371->8372 8373 410d6f __vbaHresultCheckObj 8371->8373 8374 410dba __vbaObjSet 8372->8374 8375 410d9f __vbaNew2 8372->8375 8373->8372 8377 410e08 8374->8377 8375->8374 8378 410e19 __vbaHresultCheckObj 8377->8378 8379 410e3c 8377->8379 8378->8379 8380 410e67 __vbaObjSet 8379->8380 8381 410e4c __vbaNew2 8379->8381 8383 410eb2 8380->8383 8381->8380 8384 410ec3 __vbaHresultCheckObj 8383->8384 8385 410ee6 8383->8385 8384->8385 8386 410f11 __vbaObjSet 8385->8386 8387 410ef6 __vbaNew2 8385->8387 8389 410f5c 8386->8389 8387->8386 8390 410f90 8389->8390 8391 410f6d __vbaHresultCheckObj 8389->8391 8392 410fa0 __vbaNew2 8390->8392 8393 410fbb __vbaObjSet 8390->8393 8391->8390 8392->8393 8395 41100c 8393->8395 8396 411040 8395->8396 8397 41101d __vbaHresultCheckObj 8395->8397 8398 411047 __vbaChkstk 8396->8398 8397->8398 8399 411123 8398->8399 8400 411152 8399->8400 8401 411132 __vbaHresultCheckObj 8399->8401 8402 411159 __vbaFreeObjList __vbaFreeVarList 8400->8402 8401->8402 8403 4111b2 __vbaObjSet 8402->8403 8404 411197 __vbaNew2 8402->8404 8406 4111fd 8403->8406 8404->8403 8407 41122e 8406->8407 8408 41120e __vbaHresultCheckObj 8406->8408 8449 4143b5 __vbaChkstk __vbaVarDup #645 __vbaStrMove __vbaFreeVar 8407->8449 8408->8407 8409 411291 __vbaFreeObj __vbaFreeVar 8409->8261 8413 413629 8412->8413 8414 41365a 8413->8414 8415 41363a __vbaHresultCheckObj 8413->8415 8416 413661 7 API calls 8414->8416 8415->8416 8417 4136e0 __vbaObjSet 8416->8417 8418 4136c5 __vbaNew2 8416->8418 8420 41372b 8417->8420 8418->8417 8421 41373c __vbaHresultCheckObj 8420->8421 8422 41375f 8420->8422 8423 413766 __vbaChkstk __vbaLateMemSt __vbaFreeObj __vbaFreeVar 8421->8423 8422->8423 8424 4137d5 __vbaObjSet 8423->8424 8425 4137ba __vbaNew2 8423->8425 8427 413823 8424->8427 8425->8424 8428 413834 __vbaHresultCheckObj 8427->8428 8429 413857 8427->8429 8430 41385e 10 API calls 8428->8430 8429->8430 8431 413937 8430->8431 8432 413aea __vbaFreeStr __vbaFreeVar __vbaFreeObj __vbaFreeStr 8430->8432 8434 41397a 8431->8434 8435 41395a __vbaHresultCheckObj 8431->8435 8432->8279 8436 4139a5 8434->8436 8437 41398a __vbaNew2 8434->8437 8435->8434 8438 4139e1 __vbaObjSet 8436->8438 8439 4139c6 __vbaNew2 8436->8439 8437->8436 8441 413a2c 8438->8441 8439->8438 8442 413a60 8441->8442 8443 413a3d __vbaHresultCheckObj 8441->8443 8444 413a67 __vbaObjSet 8442->8444 8443->8444 8445 413a98 8444->8445 8446 413ac9 8445->8446 8447 413aa9 __vbaHresultCheckObj 8445->8447 8448 413ad0 __vbaFreeStr __vbaFreeObjList 8446->8448 8447->8448 8448->8432 8450 414428 __vbaFreeStr 8449->8450 8450->8409 8451 40c316 __vbaChkstk 8452 40c354 7 API calls 8451->8452 8467 402910 8452->8467 8454 40c3c6 8 API calls 8455 40c471 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStr 8454->8455 8456 40c42f #537 __vbaStrMove __vbaInStr 8454->8456 8459 40c4e3 8455->8459 8457 40c456 #616 __vbaStrMove __vbaFreeStr 8456->8457 8458 40c50b __vbaErrorOverflow 8456->8458 8457->8455 8460 40c510 __vbaChkstk 8458->8460 8461 40c55b __vbaStrCopy 8460->8461 8462 40c57e 8461->8462 8463 40c5a1 8462->8463 8464 40c587 __vbaHresultCheckObj 8462->8464 8465 40c5a5 __vbaFreeStrList 8463->8465 8464->8465 8466 40c5d8 8465->8466 8468 402919 8467->8468 8469 411836 __vbaChkstk 8470 411876 __vbaStrCopy #692 __vbaVarTstNe __vbaFreeVar 8469->8470 8471 4118d0 __vbaFreeStr 8470->8471 8472 4118c0 #571 8470->8472 8472->8471 8474 40a1cb 8475 40a1d5 VirtualAlloc 8474->8475 8477 40ab01 8475->8477 8477->8477 8478 407ebf 8479 407ed7 8478->8479 8481 4080bc 8479->8481 8482 4107ea 8479->8482 8483 4107f4 __vbaHresultCheckObj 8482->8483 8484 410817 8482->8484 8485 41081e __vbaVarDup 8483->8485 8484->8485 8486 4108d2 __vbaFreeObjList __vbaFreeVarList 8485->8486 8487 410927 __vbaObjSet 8486->8487 8488 41090c __vbaNew2 8486->8488 8490 410972 8487->8490 8488->8487 8491 410983 __vbaHresultCheckObj 8490->8491 8492 4109a6 8490->8492 8493 4109ad __vbaLateIdCallLd 8491->8493 8492->8493 8494 4109e7 __vbaObjSet 8493->8494 8495 4109cc __vbaNew2 8493->8495 8497 410a35 8494->8497 8495->8494 8498 410a46 __vbaHresultCheckObj 8497->8498 8499 410a69 8497->8499 8500 410a70 __vbaLateIdCallLd 8498->8500 8499->8500 8501 410a92 __vbaNew2 8500->8501 8502 410aad __vbaObjSet 8500->8502 8501->8502 8504 410afe 8502->8504 8505 410b32 8504->8505 8506 410b0f __vbaHresultCheckObj 8504->8506 8507 410b42 __vbaNew2 8505->8507 8508 410b5d __vbaObjSet 8505->8508 8506->8505 8507->8508 8510 410bab 8508->8510 8511 410bdc 8510->8511 8512 410bbc __vbaHresultCheckObj 8510->8512 8513 410be3 __vbaStrVarMove __vbaStrMove __vbaI4Var __vbaChkstk __vbaChkstk 8511->8513 8512->8513 8514 410cba 8513->8514 8515 410ce9 8514->8515 8516 410cc9 __vbaHresultCheckObj 8514->8516 8517 410cf0 __vbaFreeStr __vbaFreeObjList __vbaFreeVarList 8515->8517 8516->8517 8518 410d60 8517->8518 8519 410d8f 8518->8519 8520 410d6f __vbaHresultCheckObj 8518->8520 8521 410dba __vbaObjSet 8519->8521 8522 410d9f __vbaNew2 8519->8522 8520->8519 8524 410e08 8521->8524 8522->8521 8525 410e19 __vbaHresultCheckObj 8524->8525 8526 410e3c 8524->8526 8525->8526 8527 410e67 __vbaObjSet 8526->8527 8528 410e4c __vbaNew2 8526->8528 8530 410eb2 8527->8530 8528->8527 8531 410ec3 __vbaHresultCheckObj 8530->8531 8532 410ee6 8530->8532 8531->8532 8533 410f11 __vbaObjSet 8532->8533 8534 410ef6 __vbaNew2 8532->8534 8536 410f5c 8533->8536 8534->8533 8537 410f90 8536->8537 8538 410f6d __vbaHresultCheckObj 8536->8538 8539 410fa0 __vbaNew2 8537->8539 8540 410fbb __vbaObjSet 8537->8540 8538->8537 8539->8540 8542 41100c 8540->8542 8543 411040 8542->8543 8544 41101d __vbaHresultCheckObj 8542->8544 8545 411047 __vbaChkstk 8543->8545 8544->8545 8546 411123 8545->8546 8547 411152 8546->8547 8548 411132 __vbaHresultCheckObj 8546->8548 8549 411159 __vbaFreeObjList __vbaFreeVarList 8547->8549 8548->8549 8550 4111b2 __vbaObjSet 8549->8550 8551 411197 __vbaNew2 8549->8551 8553 4111fd 8550->8553 8551->8550 8554 41122e 8553->8554 8555 41120e __vbaHresultCheckObj 8553->8555 8557 4143b5 6 API calls 8554->8557 8555->8554 8556 411291 __vbaFreeObj __vbaFreeVar 8556->8479 8557->8556

              Executed Functions

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 777 40a0cb-40a0ce 778 40a0d0-40a0d1 777->778 779 40a137-40a143 777->779 780 40a133 778->780 781 40a0d3-40a0f0 778->781 786 40a147-40a16d 779->786 780->779 784 40a0f2-40a0f5 781->784 785 40a0b5-40a0c9 781->785 784->786 785->777 792 40a170-40a1a6 786->792 799 40a1a8-40a1c4 792->799 800 40a21f-40a2ce 792->800 799->792 801 40a1c6-40a21e 799->801 804 40a2d0-40a311 800->804 801->800 805 40a313-40a314 804->805 806 40a36d-40a455 804->806 805->804 807 40a316-40a36a 805->807 811 40a457-40a45d 806->811 812 40a45e-40a494 806->812 807->806 811->812 813 40a496-40a4ce 812->813 814 40a4d0-40a4ec 813->814 815 40a547 813->815 814->813 818 40a4ee-40a4f4 814->818 816 40a509-40a519 815->816 817 40a549 815->817 823 40a51f-40a544 816->823 819 40a54b-40a555 817->819 820 40a5ac-40a5c3 817->820 821 40a4f6-40a508 818->821 822 40a558-40a55f 818->822 819->822 825 40a5c4-40a5c9 820->825 821->816 822->823 824 40a561 822->824 823->815 824->825 826 40a563-40a592 824->826 827 40a5ca-40a5d0 825->827 829 40a593-40a59c 826->829 830 40a5d5-40a5ee 827->830 829->830 831 40a59e-40a5a2 829->831 830->827 832 40a5f1-40a5f2 830->832 831->829 833 40a5a4-40a5a7 831->833 834 40a5f4-40a5f6 832->834 835 40a659-40a65f 832->835 833->820 836 40a661-40a6d1 834->836 837 40a5f9-40a618 834->837 835->836 838 40a61d-40a658 836->838 840 40a6d7-40a887 836->840 837->838 838->835 841 40a88b-40a8e6 840->841 841->841 842 40a8e8-40aafe VirtualAlloc 841->842 843 40ab01-40abad 842->843 843->843 844 40abb3-40abe4 843->844
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5af999bf652ef452ba6a75e124921a586b504a57ffd848da4c5b764abe152492
              • Instruction ID: 5ec0887be7f3cc5f52953df30326b3c1168f9988ec1c7f7ff65615b0ce89810f
              • Opcode Fuzzy Hash: 5af999bf652ef452ba6a75e124921a586b504a57ffd848da4c5b764abe152492
              • Instruction Fuzzy Hash: F272EADB94E7E20FE3031674ED663D62F658B63365F0B02B7D8449B9D7D01D0B8982A2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaHresultCheckObj.MSVBVM60(?,?,00402ABC,00000068), ref: 0040F2DD
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,00402ABC,00000068), ref: 0040F304
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040F33D
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402ABC,00000168), ref: 0040F38A
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040F3B1
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040F3ED
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AF8,00000068), ref: 0040F434
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040279C,00000720,?,?,?,BF8D7BB0,00005B03,00795422,0019C96F,?,00000003,32BFFE00,00005B04,?), ref: 0040F4FC
              • __vbaFreeObjList.MSVBVM60(00000004,?,?,?,?,?,?,?,BF8D7BB0,00005B03,00795422,0019C96F,?,00000003,32BFFE00,00005B04), ref: 0040F525
              • __vbaFreeVar.MSVBVM60 ref: 0040F533
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040F54B
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040F584
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000068), ref: 0040F5CB
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040F5F2
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040F62B
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AF8,00000158), ref: 0040F678
              • __vbaChkstk.MSVBVM60(?,?), ref: 0040F6B2
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040279C,00000724), ref: 0040F6F3
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0040F71C
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040F737
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040F770
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A8C,00000158), ref: 0040F7BD
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040F7E4
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040F81D
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,000000F8), ref: 0040F867
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040F88E
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040F8CA
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000138), ref: 0040F917
              • __vbaChkstk.MSVBVM60(0077A407,?), ref: 0040F987
              • __vbaChkstk.MSVBVM60(?,6EB06DA0,00005AFA,00000009,0077A407,?), ref: 0040F9B2
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040279C,00000728), ref: 0040F9F3
              • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 0040FA23
              • __vbaFreeVar.MSVBVM60 ref: 0040FA31
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040FA49
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040FA82
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000178), ref: 0040FACF
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040FAF6
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040FB2F
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000188), ref: 0040FB7C
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040FBA3
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040FBDC
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000138), ref: 0040FC29
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040FC50
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040FC8C
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000088), ref: 0040FCD9
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040FD00
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040FD3C
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A8C,00000058), ref: 0040FD83
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040FDAA
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040FDE6
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$CheckHresult$New2$Free$ChkstkList
              • String ID: BRODDENES$Britskas$Fregatternes5$If$Pidgins$Rideable7$TILBAGESENDTES$UNSQUEAMISHNESS$diskless$dmrings$pizzarestaurant$p:$symmetriegenskabernes
              • API String ID: 335668265-4230584830
              • Opcode ID: 641f40870c6376b4afe055af6e06c49f333c8d78e4992794b83fc62f3d5c8de0
              • Instruction ID: cb1fe708451b9b0f0296a1835d5ebb1cef097ceba4c5fd5db3c5e4a38acf3413
              • Opcode Fuzzy Hash: 641f40870c6376b4afe055af6e06c49f333c8d78e4992794b83fc62f3d5c8de0
              • Instruction Fuzzy Hash: D9030870900628DFDB21DFA0CC89BD9B7B8BB08304F1045EAE509BB2A1DB795AC5DF55
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040FDAA
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040FDE6
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AF8,00000198), ref: 0040FE33
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0040FE5A
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040FE96
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AF8,00000070), ref: 0040FEDD
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040279C,0000072C,?,00000003,004DE577,?,?,?), ref: 0040FFC0
              • __vbaVarMove.MSVBVM60(?,00000003,004DE577,?,?,?), ref: 0040FFDD
              • __vbaFreeObjList.MSVBVM60(00000007,?,?,?,?,?,?,?,?,00000003,004DE577,?,?,?), ref: 0041000C
              • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00410024
              • __vbaStrCopy.MSVBVM60 ref: 0041003D
              • __vbaChkstk.MSVBVM60(?,?,3AE8E970,diskless,?,UNSQUEAMISHNESS,000060CE,035926C0,00005AFD), ref: 0041009E
              • __vbaFreeStr.MSVBVM60(?,?,3AE8E970,diskless,?,UNSQUEAMISHNESS,000060CE,035926C0,00005AFD), ref: 004100C0
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,3AE8E970,diskless,?,UNSQUEAMISHNESS,000060CE,035926C0,00005AFD), ref: 004100D8
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410111
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A8C,00000160), ref: 0041015E
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410185
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 004101BE
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402ABC,00000150), ref: 00410208
              • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 0041022A
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410245
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410281
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A8C,00000110), ref: 004102CE
              • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 004102F3
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0041030E
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041034A
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AAC,00000160), ref: 00410397
              • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 004103BC
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 004103D7
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410413
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AAC,00000140), ref: 00410460
              • __vbaI4Var.MSVBVM60(?), ref: 00410489
              • __vbaI4Var.MSVBVM60(?,Fregatternes5,?,?), ref: 004104B0
              • __vbaStrVarMove.MSVBVM60(?,00002DA8,?,?,?,4B16F6C0,00005AFA,00000000,?,Fregatternes5,?,?), ref: 004104E0
              • __vbaStrMove.MSVBVM60(?,00002DA8,?,?,?,4B16F6C0,00005AFA,00000000,?,Fregatternes5,?,?), ref: 004104EA
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040279C,00000730,?,?,00000000,?,00002DA8,?,?,?,4B16F6C0,00005AFA,00000000,?), ref: 00410531
              • __vbaFreeStr.MSVBVM60(?,?,00000000,?,00002DA8,?,?,?,4B16F6C0,00005AFA,00000000,?,Fregatternes5,?,?), ref: 00410548
              • __vbaFreeObjList.MSVBVM60(00000008,?,?,?,?,?,?,?,?,?,?,00000000,?,00002DA8), ref: 0041057E
              • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 0041059D
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040279C,00000740), ref: 004105DC
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040276C,000002B4), ref: 00410678
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 004106DA
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410713
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402A8C,00000218), ref: 0041075D
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410784
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 004107BD
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$CheckHresult$New2$Free$List$CallLateMove$ChkstkCopy
              • String ID: BRODDENES$Britskas$Fregatternes5$If$Pidgins$Rideable7$TILBAGESENDTES$UNSQUEAMISHNESS$diskless$dmrings$pizzarestaurant$p:
              • API String ID: 509946452-3977931801
              • Opcode ID: ff14f9794626594913155d9e9e10155addd991d68529996314f651acf93662e2
              • Instruction ID: 4b5bf704dcc98bbc6b9f295d43f8bec579e800b4a25319a3208693eaa3c36b83
              • Opcode Fuzzy Hash: ff14f9794626594913155d9e9e10155addd991d68529996314f651acf93662e2
              • Instruction Fuzzy Hash: 2FC21971900628EFDB21DF50CC89BD9B7B8BB08304F1045EAE609BB2A1DB795AC4DF55
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 481 4106a6-4106af 482 4106b5-4106c1 481->482 483 411356-4113da __vbaErrorOverflow __vbaChkstk __vbaI4Str #697 __vbaStrMove __vbaStrCmp __vbaFreeStr 481->483 486 4106c7-4106ce 482->486 487 4112a9-411336 __vbaFreeVar 482->487 492 4113e8-4113f8 483->492 493 4113dc-4113e3 #580 483->493 489 4106d0-4106e9 __vbaNew2 486->489 490 4106eb 486->490 491 4106f5-410745 __vbaObjSet 489->491 490->491 499 410747-410768 __vbaHresultCheckObj 491->499 500 41076a 491->500 493->492 501 410771-410778 499->501 500->501 502 410795 501->502 503 41077a-410793 __vbaNew2 501->503 504 41079f-4107f2 __vbaObjSet 502->504 503->504 507 4107f4-410815 __vbaHresultCheckObj 504->507 508 410817 504->508 509 41081e-41090a __vbaVarDup __vbaFreeObjList __vbaFreeVarList 507->509 508->509 511 410927 509->511 512 41090c-410925 __vbaNew2 509->512 513 410931-410981 __vbaObjSet 511->513 512->513 516 410983-4109a4 __vbaHresultCheckObj 513->516 517 4109a6 513->517 518 4109ad-4109ca __vbaLateIdCallLd 516->518 517->518 519 4109e7 518->519 520 4109cc-4109e5 __vbaNew2 518->520 521 4109f1-410a44 __vbaObjSet 519->521 520->521 524 410a46-410a67 __vbaHresultCheckObj 521->524 525 410a69 521->525 526 410a70-410a90 __vbaLateIdCallLd 524->526 525->526 527 410a92-410aab __vbaNew2 526->527 528 410aad 526->528 529 410ab7-410b0d __vbaObjSet 527->529 528->529 532 410b32 529->532 533 410b0f-410b30 __vbaHresultCheckObj 529->533 534 410b39-410b40 532->534 533->534 535 410b42-410b5b __vbaNew2 534->535 536 410b5d 534->536 537 410b67-410bba __vbaObjSet 535->537 536->537 540 410bdc 537->540 541 410bbc-410bda __vbaHresultCheckObj 537->541 542 410be3-410cc7 __vbaStrVarMove __vbaStrMove __vbaI4Var __vbaChkstk * 2 540->542 541->542 544 410ce9 542->544 545 410cc9-410ce7 __vbaHresultCheckObj 542->545 546 410cf0-410d6d __vbaFreeStr __vbaFreeObjList __vbaFreeVarList 544->546 545->546 548 410d8f 546->548 549 410d6f-410d8d __vbaHresultCheckObj 546->549 550 410d96-410d9d 548->550 549->550 551 410dba 550->551 552 410d9f-410db8 __vbaNew2 550->552 553 410dc4-410e17 __vbaObjSet 551->553 552->553 556 410e19-410e3a __vbaHresultCheckObj 553->556 557 410e3c 553->557 558 410e43-410e4a 556->558 557->558 559 410e67 558->559 560 410e4c-410e65 __vbaNew2 558->560 561 410e71-410ec1 __vbaObjSet 559->561 560->561 564 410ec3-410ee4 __vbaHresultCheckObj 561->564 565 410ee6 561->565 566 410eed-410ef4 564->566 565->566 567 410f11 566->567 568 410ef6-410f0f __vbaNew2 566->568 569 410f1b-410f6b __vbaObjSet 567->569 568->569 572 410f90 569->572 573 410f6d-410f8e __vbaHresultCheckObj 569->573 574 410f97-410f9e 572->574 573->574 575 410fa0-410fb9 __vbaNew2 574->575 576 410fbb 574->576 577 410fc5-41101b __vbaObjSet 575->577 576->577 580 411040 577->580 581 41101d-41103e __vbaHresultCheckObj 577->581 582 411047-411130 __vbaChkstk 580->582 581->582 584 411152 582->584 585 411132-411150 __vbaHresultCheckObj 582->585 586 411159-411195 __vbaFreeObjList __vbaFreeVarList 584->586 585->586 587 4111b2 586->587 588 411197-4111b0 __vbaNew2 586->588 589 4111bc-41120c __vbaObjSet 587->589 588->589 592 41122e 589->592 593 41120e-41122c __vbaHresultCheckObj 589->593 594 411235-41128b call 4143b5 592->594 593->594 595 411291-4112a4 __vbaFreeObj __vbaFreeVar 594->595
              APIs
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 004106DA
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410713
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402A8C,00000218), ref: 0041075D
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410784
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 004107BD
              • __vbaHresultCheckObj.MSVBVM60(?,?,00402A8C,000001A0,00408161), ref: 0041080A
              • __vbaVarDup.MSVBVM60(00000000,?,00402A8C,000001A0), ref: 00410897
              • __vbaFreeVar.MSVBVM60(00411337), ref: 00411331
              • __vbaErrorOverflow.MSVBVM60 ref: 00411356
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00411377
              • __vbaI4Str.MSVBVM60(00402D70,?,?,?,?,004014C6), ref: 004113A0
              • #697.MSVBVM60(00000000,00402D70,?,?,?,?,004014C6), ref: 004113A6
              • __vbaStrMove.MSVBVM60(00000000,00402D70,?,?,?,?,004014C6), ref: 004113B0
              • __vbaStrCmp.MSVBVM60(00402D7C,00000000,00000000,00402D70,?,?,?,?,004014C6), ref: 004113BB
              • __vbaFreeStr.MSVBVM60(00402D7C,00000000,00000000,00402D70,?,?,?,?,004014C6), ref: 004113CF
              • #580.MSVBVM60(HJDE,00000001,00402D7C,00000000,00000000,00402D70,?,?,?,?,004014C6), ref: 004113E3
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$CheckFreeHresultNew2$#580#697ChkstkErrorMoveOverflow
              • String ID: BRODDENES$Britskas$HJDE$If$TILBAGESENDTES$dmrings
              • API String ID: 2705637564-1969145881
              • Opcode ID: f14d4cd94f79623259cac24463c8c615014540e173036e35def236904aca4a87
              • Instruction ID: 09187d55962f989a4aaaf0f2b7058c11881010cbe5f6498cba40d882f44503fd
              • Opcode Fuzzy Hash: f14d4cd94f79623259cac24463c8c615014540e173036e35def236904aca4a87
              • Instruction Fuzzy Hash: C6621970900618DFDB21DFA0CC89BD9B7B8BB09304F1045EAE509BB2A1DB795AC5CF59
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 597 4107ea-4107f2 598 4107f4-410815 __vbaHresultCheckObj 597->598 599 410817 597->599 600 41081e-41090a __vbaVarDup __vbaFreeObjList __vbaFreeVarList 598->600 599->600 602 410927 600->602 603 41090c-410925 __vbaNew2 600->603 604 410931-410981 __vbaObjSet 602->604 603->604 607 410983-4109a4 __vbaHresultCheckObj 604->607 608 4109a6 604->608 609 4109ad-4109ca __vbaLateIdCallLd 607->609 608->609 610 4109e7 609->610 611 4109cc-4109e5 __vbaNew2 609->611 612 4109f1-410a44 __vbaObjSet 610->612 611->612 615 410a46-410a67 __vbaHresultCheckObj 612->615 616 410a69 612->616 617 410a70-410a90 __vbaLateIdCallLd 615->617 616->617 618 410a92-410aab __vbaNew2 617->618 619 410aad 617->619 620 410ab7-410b0d __vbaObjSet 618->620 619->620 623 410b32 620->623 624 410b0f-410b30 __vbaHresultCheckObj 620->624 625 410b39-410b40 623->625 624->625 626 410b42-410b5b __vbaNew2 625->626 627 410b5d 625->627 628 410b67-410bba __vbaObjSet 626->628 627->628 631 410bdc 628->631 632 410bbc-410bda __vbaHresultCheckObj 628->632 633 410be3-410cc7 __vbaStrVarMove __vbaStrMove __vbaI4Var __vbaChkstk * 2 631->633 632->633 635 410ce9 633->635 636 410cc9-410ce7 __vbaHresultCheckObj 633->636 637 410cf0-410d6d __vbaFreeStr __vbaFreeObjList __vbaFreeVarList 635->637 636->637 639 410d8f 637->639 640 410d6f-410d8d __vbaHresultCheckObj 637->640 641 410d96-410d9d 639->641 640->641 642 410dba 641->642 643 410d9f-410db8 __vbaNew2 641->643 644 410dc4-410e17 __vbaObjSet 642->644 643->644 647 410e19-410e3a __vbaHresultCheckObj 644->647 648 410e3c 644->648 649 410e43-410e4a 647->649 648->649 650 410e67 649->650 651 410e4c-410e65 __vbaNew2 649->651 652 410e71-410ec1 __vbaObjSet 650->652 651->652 655 410ec3-410ee4 __vbaHresultCheckObj 652->655 656 410ee6 652->656 657 410eed-410ef4 655->657 656->657 658 410f11 657->658 659 410ef6-410f0f __vbaNew2 657->659 660 410f1b-410f6b __vbaObjSet 658->660 659->660 663 410f90 660->663 664 410f6d-410f8e __vbaHresultCheckObj 660->664 665 410f97-410f9e 663->665 664->665 666 410fa0-410fb9 __vbaNew2 665->666 667 410fbb 665->667 668 410fc5-41101b __vbaObjSet 666->668 667->668 671 411040 668->671 672 41101d-41103e __vbaHresultCheckObj 668->672 673 411047-411130 __vbaChkstk 671->673 672->673 675 411152 673->675 676 411132-411150 __vbaHresultCheckObj 673->676 677 411159-411195 __vbaFreeObjList __vbaFreeVarList 675->677 676->677 678 4111b2 677->678 679 411197-4111b0 __vbaNew2 677->679 680 4111bc-41120c __vbaObjSet 678->680 679->680 683 41122e 680->683 684 41120e-41122c __vbaHresultCheckObj 680->684 685 411235-41128b call 4143b5 683->685 684->685 686 411291-4112a4 __vbaFreeObj __vbaFreeVar 685->686
              APIs
              • __vbaHresultCheckObj.MSVBVM60(?,?,00402A8C,000001A0,00408161), ref: 0041080A
              • __vbaVarDup.MSVBVM60(00000000,?,00402A8C,000001A0), ref: 00410897
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 004108DC
              • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 004108FB
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410916
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041094F
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000130), ref: 00410999
              • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 004109BB
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 004109D6
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410A0F
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,000000F8), ref: 00410A5C
              • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 00410A81
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410A9C
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410AD8
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AAC,00000130), ref: 00410B25
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410B4C
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410B88
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AAC,00000060), ref: 00410BCF
              • __vbaStrVarMove.MSVBVM60(?), ref: 00410C33
              • __vbaStrMove.MSVBVM60(?), ref: 00410C3D
              • __vbaI4Var.MSVBVM60(?,00000009,?,00003A7A,?), ref: 00410C70
              • __vbaChkstk.MSVBVM60(00000000,?,00000009,?,00003A7A,?), ref: 00410C79
              • __vbaChkstk.MSVBVM60(003AD305,?,00000000,?,00000009,?,00003A7A,?), ref: 00410C96
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040279C,00000734), ref: 00410CDC
              • __vbaFreeStr.MSVBVM60(00000000,?,0040279C,00000734), ref: 00410CF3
              • __vbaFreeObjList.MSVBVM60(00000006,?,?,?,?,?,?), ref: 00410D1B
              • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 00410D3A
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040279C,00000738), ref: 00410D82
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410DA9
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410DE2
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402AF8,00000080), ref: 00410E2F
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410E56
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410E8F
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AAC,00000170), ref: 00410ED9
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410F00
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410F39
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000158), ref: 00410F83
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 00410FAA
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00410FE6
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000138), ref: 00411033
              • __vbaChkstk.MSVBVM60(4C805220,?,00000008,?), ref: 004110EA
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040279C,0000073C), ref: 00411145
              • __vbaFreeObjList.MSVBVM60(00000004,?,?,?,?), ref: 0041116E
              • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00411186
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 004111A1
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 004111DA
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402ABC,00000070), ref: 00411221
              • __vbaFreeObj.MSVBVM60(?,?,00000003,?,?,D18F62D0,00005B01), ref: 00411294
              • __vbaFreeVar.MSVBVM60(?,?,00000003,?,?,D18F62D0,00005B01), ref: 0041129F
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$CheckHresult$FreeNew2$List$Chkstk$CallLateMove
              • String ID: BRODDENES$Britskas$If$TILBAGESENDTES$dmrings
              • API String ID: 3604166182-1692888291
              • Opcode ID: 54ef1f018802b19c984a47ce9cb66c42b1b2a75c776f8ac2aa50383b8001863a
              • Instruction ID: ab1f8e69898914df29d759dcb10daa11fc0fb502cf2ea95188d2280444960f4a
              • Opcode Fuzzy Hash: 54ef1f018802b19c984a47ce9cb66c42b1b2a75c776f8ac2aa50383b8001863a
              • Instruction Fuzzy Hash: 6B521AB1900628DFDB21DF50CC89BD9B7B8BB08304F1045EAE649BB2A1DB755AC4CF59
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 688 4135a5-413638 __vbaChkstk __vbaVarDup __vbaStrCopy * 2 690 41365a 688->690 691 41363a-413658 __vbaHresultCheckObj 688->691 692 413661-4136c3 __vbaChkstk * 2 __vbaLateMemCallLd __vbaObjVar __vbaObjSetAddref __vbaFreeObj __vbaFreeVar 690->692 691->692 693 4136e0 692->693 694 4136c5-4136de __vbaNew2 692->694 695 4136ea-41373a __vbaObjSet 693->695 694->695 698 41373c-41375d __vbaHresultCheckObj 695->698 699 41375f 695->699 700 413766-4137b8 __vbaChkstk __vbaLateMemSt __vbaFreeObj __vbaFreeVar 698->700 699->700 701 4137d5 700->701 702 4137ba-4137d3 __vbaNew2 700->702 703 4137df-413832 __vbaObjSet 701->703 702->703 706 413834-413855 __vbaHresultCheckObj 703->706 707 413857 703->707 708 41385e-413931 __vbaChkstk __vbaLateMemSt __vbaFreeObj __vbaChkstk __vbaLateMemSt __vbaChkstk __vbaLateMemSt __vbaLateMemCallLd __vbaVarTstEq __vbaFreeVar 706->708 707->708 709 413937-413958 708->709 710 413aea-413b42 __vbaFreeStr __vbaFreeVar __vbaFreeObj __vbaFreeStr 708->710 713 41397a 709->713 714 41395a-413978 __vbaHresultCheckObj 709->714 715 413981-413988 713->715 714->715 716 4139a5 715->716 717 41398a-4139a3 __vbaNew2 715->717 718 4139af-4139c4 716->718 717->718 719 4139e1 718->719 720 4139c6-4139df __vbaNew2 718->720 721 4139eb-413a3b __vbaObjSet 719->721 720->721 724 413a60 721->724 725 413a3d-413a5e __vbaHresultCheckObj 721->725 726 413a67-413aa7 __vbaObjSet 724->726 725->726 728 413ac9 726->728 729 413aa9-413ac7 __vbaHresultCheckObj 726->729 730 413ad0-413ae7 __vbaFreeStr __vbaFreeObjList 728->730 729->730 730->710
              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 004135C2
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 004135DA
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 004135E5
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 004135F0
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040276C,00000218), ref: 0041364D
              • __vbaChkstk.MSVBVM60(00000000,?,0040276C,00000218), ref: 00413664
              • __vbaChkstk.MSVBVM60(00000000,?,0040276C,00000218), ref: 00413675
              • __vbaLateMemCallLd.MSVBVM60(?,?,Add,00000002), ref: 00413694
              • __vbaObjVar.MSVBVM60(00000000), ref: 0041369D
              • __vbaObjSetAddref.MSVBVM60(?,00000000,00000000), ref: 004136A7
              • __vbaFreeObj.MSVBVM60(?,00000000,00000000), ref: 004136AF
              • __vbaFreeVar.MSVBVM60(?,00000000,00000000), ref: 004136B7
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,00000000,00000000), ref: 004136CF
              • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 00413708
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000108), ref: 00413752
              • __vbaChkstk.MSVBVM60(00000000,?,00402A9C,00000108), ref: 00413786
              • __vbaLateMemSt.MSVBVM60(?,Text), ref: 0041379C
              • __vbaFreeObj.MSVBVM60(?,Text), ref: 004137A4
              • __vbaFreeVar.MSVBVM60(?,Text), ref: 004137AC
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,Text), ref: 004137C4
              • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 004137FD
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A8C,000001D8), ref: 0041384A
              • __vbaChkstk.MSVBVM60(00000000,?,00402A8C,000001D8), ref: 00413873
              • __vbaLateMemSt.MSVBVM60(?,Left), ref: 00413889
              • __vbaFreeObj.MSVBVM60(?,Left), ref: 00413891
              • __vbaChkstk.MSVBVM60(?,Left), ref: 004138A7
              • __vbaLateMemSt.MSVBVM60(?,Top,?,Left), ref: 004138BD
              • __vbaChkstk.MSVBVM60(?,Top,?,Left), ref: 004138D0
              • __vbaLateMemSt.MSVBVM60(?,Visible,?,Top,?,Left), ref: 004138E6
              • __vbaLateMemCallLd.MSVBVM60(00000008,?,Text,00000000,?,Visible,?,Top,?,Left), ref: 00413907
              • __vbaVarTstEq.MSVBVM60(?,00000000,?,?,00000000,00000000), ref: 00413914
              • __vbaFreeVar.MSVBVM60(?,00000000,?,?,00000000,00000000), ref: 00413923
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040276C,00000160), ref: 0041396D
              • __vbaNew2.MSVBVM60(00402DB0,00415348), ref: 00413994
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 004139D0
              • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 00413A09
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402ABC,00000110), ref: 00413A53
              • __vbaObjSet.MSVBVM60(?,?,00000000), ref: 00413A81
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,00000040), ref: 00413ABC
              • __vbaFreeStr.MSVBVM60(00000000,?,00402DA0,00000040), ref: 00413AD3
              • __vbaFreeObjList.MSVBVM60(00000002,00000000,?), ref: 00413AE2
              • __vbaFreeStr.MSVBVM60(00413B43,?,00000000,?,?,00000000,00000000), ref: 00413B25
              • __vbaFreeVar.MSVBVM60(00413B43,?,00000000,?,?,00000000,00000000), ref: 00413B2D
              • __vbaFreeObj.MSVBVM60(00413B43,?,00000000,?,?,00000000,00000000), ref: 00413B35
              • __vbaFreeStr.MSVBVM60(00413B43,?,00000000,?,?,00000000,00000000), ref: 00413B3D
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$Chkstk$CheckHresultLate$New2$CallCopy$AddrefList
              • String ID: Add$HSA$Left$SVIGERSNNEN$Text$Top$VB.TextBox$Visible$markgreve
              • API String ID: 2480442511-4046506366
              • Opcode ID: de72c1650f230a0aee99d5c18e78e0f77014958a48ed26159c05417a0b84c354
              • Instruction ID: a69d5e83040a22f6baccc720c669d2476e6f1031d89c652fa090be399f7f65f3
              • Opcode Fuzzy Hash: de72c1650f230a0aee99d5c18e78e0f77014958a48ed26159c05417a0b84c354
              • Instruction Fuzzy Hash: FBE12870A01218EFDB10EF90CC45BDDBBB5AF09305F1044AAF549BB2A1CBB95A85CF59
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 0040C330
              • #607.MSVBVM60(?,000000FF,00000002), ref: 0040C372
              • __vbaStrVarMove.MSVBVM60(?,?,000000FF,00000002), ref: 0040C37B
              • __vbaStrMove.MSVBVM60(?,?,000000FF,00000002), ref: 0040C385
              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,000000FF,00000002), ref: 0040C394
              • __vbaLenBstr.MSVBVM60(?,?,?,004014C6), ref: 0040C39F
              • __vbaStrToAnsi.MSVBVM60(00000000,?,00000000,?,?,?,004014C6), ref: 0040C3AC
              • __vbaStrToAnsi.MSVBVM60(?,?,00000000,00000000,?,00000000,?,?,?,004014C6), ref: 0040C3BB
              • __vbaSetSystemError.MSVBVM60(00000000,?,?,00000000,00000000,?,00000000,?,?,?,004014C6), ref: 0040C3C6
              • __vbaStrToUnicode.MSVBVM60(?,?,00000000,?,?,00000000,00000000,?,00000000,?,?,?,004014C6), ref: 0040C3D1
              • __vbaStrToUnicode.MSVBVM60(?,00000000,?,?,00000000,?,?,00000000,00000000,?,00000000,?,?,?,004014C6), ref: 0040C3DD
              • __vbaFreeStrList.MSVBVM60(00000002,?,00000000,?,00000000,?,?,00000000,?,?,00000000,00000000,?,00000000,?), ref: 0040C3EC
              • #537.MSVBVM60(00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C3FB
              • __vbaStrMove.MSVBVM60(00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C405
              • __vbaInStr.MSVBVM60(00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C40D
              • __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C422
              • #537.MSVBVM60(00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C436
              • __vbaStrMove.MSVBVM60(00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C440
              • __vbaInStr.MSVBVM60(00000000,00000000,00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C448
              • #616.MSVBVM60(?,-00000001,00000000,00000000,00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?), ref: 0040C45A
              • __vbaStrMove.MSVBVM60(?,-00000001,00000000,00000000,00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?), ref: 0040C464
              • __vbaFreeStr.MSVBVM60(?,-00000001,00000000,00000000,00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?), ref: 0040C46C
              • __vbaStrCat.MSVBVM60(00402A50,?,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C47B
              • __vbaStrMove.MSVBVM60(00402A50,?,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C485
              • __vbaStrCat.MSVBVM60(?,00000000,00402A50,?,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C48E
              • __vbaStrMove.MSVBVM60(?,00000000,00402A50,?,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C498
              • __vbaFreeStr.MSVBVM60(?,00000000,00402A50,?,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C4A0
              • __vbaErrorOverflow.MSVBVM60(00000000,00000000,00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C50B
              • __vbaChkstk.MSVBVM60(00000000,004014C6,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C52C
              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,004014C6,00000000), ref: 0040C563
              • __vbaHresultCheckObj.MSVBVM60(00000000,004011A0,0040279C,000006F8), ref: 0040C597
              • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0040C5AF
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Move$Free$List$#537AnsiChkstkErrorUnicode$#607#616BstrCheckCopyHresultOverflowSystem
              • String ID: USERNAME
              • API String ID: 1401190187-1047370299
              • Opcode ID: 81d8ea3eacccc889fa38942028c023c7d609be47b29976974265f14a2066c110
              • Instruction ID: 43f9ebd694a6e34167ded0a25cf51c16c46c1cf94341b2ca8444a5c0773e21fe
              • Opcode Fuzzy Hash: 81d8ea3eacccc889fa38942028c023c7d609be47b29976974265f14a2066c110
              • Instruction Fuzzy Hash: 4A610A71900209AFDB01EFA1CC86FEE7BB8AF04704F14853AF515B71E1DB7999458B98
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00411F7E
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00411F96
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00411FA1
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00411FAC
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00411FB7
              • __vbaVarDup.MSVBVM60 ref: 00411FD0
              • #543.MSVBVM60(?,?), ref: 00411FDD
              • __vbaVarTstNe.MSVBVM60(00008002,?,?,?,?,?), ref: 00412001
              • __vbaFreeVarList.MSVBVM60(00000002,?,?,00008002,?,?,?,?,?), ref: 00412017
              • __vbaNew2.MSVBVM60(00402DB0,00415348), ref: 00412041
              • __vbaCastObj.MSVBVM60(?,00402EE0,Homoplasy), ref: 00412077
              • __vbaObjSet.MSVBVM60(?,00000000,?,00402EE0,Homoplasy), ref: 00412081
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,00000040), ref: 004120BC
              • __vbaFreeObj.MSVBVM60(00000000,?,00402DA0,00000040), ref: 004120D3
              • __vbaFreeObj.MSVBVM60(00412127), ref: 00412101
              • __vbaFreeStr.MSVBVM60(00412127), ref: 00412109
              • __vbaFreeVar.MSVBVM60(00412127), ref: 00412111
              • __vbaFreeStr.MSVBVM60(00412127), ref: 00412119
              • __vbaFreeVar.MSVBVM60(00412127), ref: 00412121
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$Copy$#543CastCheckChkstkHresultListNew2
              • String ID: 14:14:14$HSA$Homoplasy
              • API String ID: 2559661485-3487747675
              • Opcode ID: 41478cb700f60b29f6471828fc27585e42762e766cc98e2e47ceacbf02cc5430
              • Instruction ID: e484cfba8a4e81124a40dcde2717f9d014197f4040bb8fba99ea8b2e8966670f
              • Opcode Fuzzy Hash: 41478cb700f60b29f6471828fc27585e42762e766cc98e2e47ceacbf02cc5430
              • Instruction Fuzzy Hash: 61411D7090021C9FCB10DBA1CD46FEEB7B8BF14304F54456AE109B71A1DBB95A89CB59
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00411852
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 0041187C
              • #692.MSVBVM60(?,exospheres,Marginalposition,?,?,?,?,004014C6), ref: 0041188F
              • __vbaVarTstNe.MSVBVM60(00008008,?), ref: 004118A7
              • __vbaFreeVar.MSVBVM60(00008008,?), ref: 004118B3
              • #571.MSVBVM60(000000D3,00008008,?), ref: 004118C5
              • __vbaFreeStr.MSVBVM60(004118F3,00008008,?), ref: 004118ED
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$#571#692ChkstkCopy
              • String ID: Marginalposition$exospheres
              • API String ID: 3621861193-2891326796
              • Opcode ID: aefe0329804d131029e785a7ff6b982b269221e1b4108a7647cf26c567d78ce6
              • Instruction ID: 62ee4990a67bcc75ea5b8ee160afd48da7059f49fcbc34a0bd79d1efe4ee82c7
              • Opcode Fuzzy Hash: aefe0329804d131029e785a7ff6b982b269221e1b4108a7647cf26c567d78ce6
              • Instruction Fuzzy Hash: 62114C74901248ABDB00EFD1C946FEEBBB8AF00B04F10842AF501B71E0D77D9A45CB98
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 004143D0
              • __vbaVarDup.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004014C6), ref: 004143F6
              • #645.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00414401
              • __vbaStrMove.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 0041440B
              • __vbaFreeVar.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00414413
              • __vbaFreeStr.MSVBVM60(00414431,?,00000000,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 0041442B
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$#645ChkstkMove
              • String ID: RESPONDER
              • API String ID: 769593574-468911128
              • Opcode ID: e3df1314072516b17679cfdaf96e696ec864ac636f28d76576c0831631c43160
              • Instruction ID: 623a2e9b44232dd63997e88e693712c8ce0067b854bce3e221dec5aad6ff09f6
              • Opcode Fuzzy Hash: e3df1314072516b17679cfdaf96e696ec864ac636f28d76576c0831631c43160
              • Instruction Fuzzy Hash: 9AF03171901208ABDB00EB91CD56FDEB7B8EB54708F60892EF001775E0DB796E04CB69
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 766 40241d-40c555 __vbaChkstk 768 40c55b-40c578 __vbaStrCopy call 402910 766->768 769 40c57e-40c585 768->769 770 40c5a1 769->770 771 40c587-40c59f __vbaHresultCheckObj 769->771 772 40c5a5-40c5d8 __vbaFreeStrList 770->772 771->772
              APIs
              • __vbaChkstk.MSVBVM60(00000000,004014C6,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C52C
              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,004014C6,00000000), ref: 0040C563
              • __vbaHresultCheckObj.MSVBVM60(00000000,004011A0,0040279C,000006F8), ref: 0040C597
              • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0040C5AF
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$CheckChkstkCopyFreeHresultList
              • String ID: G$USERNAME
              • API String ID: 3070489859-465494610
              • Opcode ID: 3077c11547f5f0d3d7c2db014c4cf2d4f8c93d40167859c243ac57e2044c823c
              • Instruction ID: a866738bb26e572f9d2f0443212f154c423d73a6f910d0efb92d6ad17d685401
              • Opcode Fuzzy Hash: 3077c11547f5f0d3d7c2db014c4cf2d4f8c93d40167859c243ac57e2044c823c
              • Instruction Fuzzy Hash: 2D213875940208FFCB00DF95CC86BDE7BB8AB08744F108136F509AB2A0D778A6418B98
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 775 401714-401731 #100 776 401739 775->776
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: #100
              • String ID: VB5!6&*
              • API String ID: 1341478452-3593831657
              • Opcode ID: 1ebfa7cea9b78e9819895b1e379a45de5423944a1e15eb1bc593f88b1c4642cd
              • Instruction ID: fcf28688819d7af4624bc1326912388632d7491fd93b70435748f7e10a3165c3
              • Opcode Fuzzy Hash: 1ebfa7cea9b78e9819895b1e379a45de5423944a1e15eb1bc593f88b1c4642cd
              • Instruction Fuzzy Hash: A4D09BA594E3D15ED7272375082250A2F309C4364532F45E7D091EB4F3D5298809D7A6
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 845 40a0fb-40a1c4 855 40a170-40a1a6 845->855 856 40a1c6-40a21e 845->856 858 40a21f-40a2ce 855->858 880 40a1a8-40a1c4 855->880 856->858 861 40a2d0-40a311 858->861 863 40a313-40a314 861->863 864 40a36d-40a455 861->864 863->861 866 40a316-40a36a 863->866 872 40a457-40a45d 864->872 873 40a45e-40a494 864->873 866->864 872->873 874 40a496-40a4ce 873->874 876 40a4d0-40a4ec 874->876 877 40a547 874->877 876->874 881 40a4ee-40a4f4 876->881 878 40a509-40a519 877->878 879 40a549 877->879 886 40a51f-40a544 878->886 882 40a54b-40a555 879->882 883 40a5ac-40a5c3 879->883 880->855 880->856 884 40a4f6-40a508 881->884 885 40a558-40a55f 881->885 882->885 888 40a5c4-40a5c9 883->888 884->878 885->886 887 40a561 885->887 886->877 887->888 889 40a563-40a592 887->889 890 40a5ca-40a5d0 888->890 892 40a593-40a59c 889->892 893 40a5d5-40a5ee 890->893 892->893 894 40a59e-40a5a2 892->894 893->890 895 40a5f1-40a5f2 893->895 894->892 896 40a5a4-40a5a7 894->896 897 40a5f4-40a5f6 895->897 898 40a659-40a65f 895->898 896->883 899 40a661-40a6d1 897->899 900 40a5f9-40a618 897->900 898->899 901 40a61d-40a658 899->901 903 40a6d7-40a887 899->903 900->901 901->898 904 40a88b-40a8e6 903->904 904->904 905 40a8e8-40aafe VirtualAlloc 904->905 906 40ab01-40abad 905->906 906->906 907 40abb3-40abe4 906->907
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7e5336acb9d27bb8715b184a83e315ed92e50f5d9a50ed947bd5d6ef2ec70028
              • Instruction ID: 74fc88bdf8f110d95e0f2c1a6a86e28da7ef9fc0ec45090476b6deb5aa66567c
              • Opcode Fuzzy Hash: 7e5336acb9d27bb8715b184a83e315ed92e50f5d9a50ed947bd5d6ef2ec70028
              • Instruction Fuzzy Hash: 0C72AADB94E7E10FE3031674ED663E62FA58B63365F0B02F7D8449A9D7D01D0B898292
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 908 40a1cb-40a2ce 914 40a2d0-40a311 908->914 915 40a313-40a314 914->915 916 40a36d-40a455 914->916 915->914 917 40a316-40a36a 915->917 921 40a457-40a45d 916->921 922 40a45e-40a494 916->922 917->916 921->922 923 40a496-40a4ce 922->923 924 40a4d0-40a4ec 923->924 925 40a547 923->925 924->923 928 40a4ee-40a4f4 924->928 926 40a509-40a519 925->926 927 40a549 925->927 933 40a51f-40a544 926->933 929 40a54b-40a555 927->929 930 40a5ac-40a5c3 927->930 931 40a4f6-40a508 928->931 932 40a558-40a55f 928->932 929->932 935 40a5c4-40a5c9 930->935 931->926 932->933 934 40a561 932->934 933->925 934->935 936 40a563-40a592 934->936 937 40a5ca-40a5d0 935->937 939 40a593-40a59c 936->939 940 40a5d5-40a5ee 937->940 939->940 941 40a59e-40a5a2 939->941 940->937 942 40a5f1-40a5f2 940->942 941->939 943 40a5a4-40a5a7 941->943 944 40a5f4-40a5f6 942->944 945 40a659-40a65f 942->945 943->930 946 40a661-40a6d1 944->946 947 40a5f9-40a618 944->947 945->946 948 40a61d-40a658 946->948 950 40a6d7-40a887 946->950 947->948 948->945 951 40a88b-40a8e6 950->951 951->951 952 40a8e8-40aafe VirtualAlloc 951->952 953 40ab01-40abad 952->953 953->953 954 40abb3-40abe4 953->954
              APIs
              • VirtualAlloc.KERNELBASE(?,0000C000,00001000,00000040), ref: 0040AA81
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: ebcb4cf11cced5ed508bbf8c6fbd3bd6ff05167eb289bddf0d578dd5e171f4eb
              • Instruction ID: e252c782743f26cbad6073e4c949e9d5248cfb67d323fff3ba520539c152fffe
              • Opcode Fuzzy Hash: ebcb4cf11cced5ed508bbf8c6fbd3bd6ff05167eb289bddf0d578dd5e171f4eb
              • Instruction Fuzzy Hash: 236298DB94E7E10FE3031674ED263E62FA58B53365F1B02F7D8849A9D7D01D0B898292
              Uniqueness

              Uniqueness Score: -1.00%

              Non-executed Functions

              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID: rX4
              • API String ID: 0-805084833
              • Opcode ID: 4a73ffdef601368dc9eefd72bb7bdc5cb8df7069adc4f74046159a1db4aa907c
              • Instruction ID: 8495d65bee99a05eaac6e5fb65ac79d4fc639ee299daeae84c86cec51cd4d14f
              • Opcode Fuzzy Hash: 4a73ffdef601368dc9eefd72bb7bdc5cb8df7069adc4f74046159a1db4aa907c
              • Instruction Fuzzy Hash: 10E09279644707AF9B186FA4A4D12E927A36F193A0BD0416ABC2192284EBB1C845DB11
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: afb1145b58625a29be9886dd26205ffbaa0369be71f88ba98b22e4b6ba21c648
              • Instruction ID: 38f90e402a184d19601563570752a707fcbfbd5bd0326e183e5342f1f955f1c0
              • Opcode Fuzzy Hash: afb1145b58625a29be9886dd26205ffbaa0369be71f88ba98b22e4b6ba21c648
              • Instruction Fuzzy Hash: D9A10931780706EFD7189E28CDD4BD673A6BF06350F594329ECA9932C0D7B5A899CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bfb7aca369959c3e2a2d789d0b2917db1d653747dcaa1fe0e48505e64afd4768
              • Instruction ID: c7d1d38faf95a836c16f134c60ca76066e23f7e08bc36599432decd8585f77fe
              • Opcode Fuzzy Hash: bfb7aca369959c3e2a2d789d0b2917db1d653747dcaa1fe0e48505e64afd4768
              • Instruction Fuzzy Hash: 31A12B70A843828EDB24DF3885D476ABB959F56360F4582A9DDE6CF2DAC3B0C452C712
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6e650449d3cd74665b521b835a95441db521d9e268a35fa966e6771cd53ef7b
              • Instruction ID: 1ded4bcc688219cdd566a8c781e22779cab1a8942806211178f0e119737127c6
              • Opcode Fuzzy Hash: b6e650449d3cd74665b521b835a95441db521d9e268a35fa966e6771cd53ef7b
              • Instruction Fuzzy Hash: 6B716C70A84382CEDB14DF7884D4759BBA5EF66360F49815DCDA68F2D6C3B1C042CB62
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8bd1f324c439cc3332c8f46072fd008ca8107cc3dd24a1e105e2ef5f1224dddc
              • Instruction ID: 64a62bd2010ac5a93b778c4fe0e3b53e267efc6adbda6bec9145b3a8ddec53d5
              • Opcode Fuzzy Hash: 8bd1f324c439cc3332c8f46072fd008ca8107cc3dd24a1e105e2ef5f1224dddc
              • Instruction Fuzzy Hash: 73511774A84382CEDB15DF3884D4B56BB91EF56364F49829DCDA68F2D6C3B1C042CB52
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 016a7bc9c12dadf8f5c3cdb13f60eaaba319ad17c6171b437c01b2550f13f640
              • Instruction ID: c622275c965c9f945c15123e7285285e4b6d094aa8d63208e39cca74b285b100
              • Opcode Fuzzy Hash: 016a7bc9c12dadf8f5c3cdb13f60eaaba319ad17c6171b437c01b2550f13f640
              • Instruction Fuzzy Hash: 4541D170684304AEEB246A208CDCBE577A6BF0A764F964145EC669B1E2C7F5C8C4CA11
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 65968fd5ac6444f8be60e74caf84c52efc77d9edbd1fd828b227a2e1747197af
              • Instruction ID: 0d1ba2b0c585ed4176e1ec81208392563a036a91c289001d606dd57ffd64ef07
              • Opcode Fuzzy Hash: 65968fd5ac6444f8be60e74caf84c52efc77d9edbd1fd828b227a2e1747197af
              • Instruction Fuzzy Hash: 5421D3306C0301EEEB246B6098D9FD93767EF45B10F8A8145ED666F0D2C7F29884CA11
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 819ab78417e819bc863569baa5bf56a28bffc5c72c66d9649581e3290eac7ccb
              • Instruction ID: 331dc770059b1a055e52f02b20765f758ec287c20051d44758e9e91f850ae060
              • Opcode Fuzzy Hash: 819ab78417e819bc863569baa5bf56a28bffc5c72c66d9649581e3290eac7ccb
              • Instruction Fuzzy Hash: 57F05E34381300DFD729DE18C5D0B6A73B7BBA4B50FC58469D8068B1D6C764E840EE11
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 57a8d8264201017a1d51e18f219bed2ec61f8b951a981a192e44d16de404805b
              • Instruction ID: 3717ead56cfc4a482ff82f4e731c99a1f087b73de58fc83daf9d4b067904a33e
              • Opcode Fuzzy Hash: 57a8d8264201017a1d51e18f219bed2ec61f8b951a981a192e44d16de404805b
              • Instruction Fuzzy Hash: 53C08CB2345480CFFB84CE08C481F0033B1FB10A48F0800A4E8028FA82C334E820C600
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5ed2511702d7b69225ed1970ee9bd7944878a4dc7cb4fa9e3b54f5268025ccd5
              • Instruction ID: 5c9b83513dbec638cdb96462a82d9224053ac555cbf1cc7b43e47a7eeea745a4
              • Opcode Fuzzy Hash: 5ed2511702d7b69225ed1970ee9bd7944878a4dc7cb4fa9e3b54f5268025ccd5
              • Instruction Fuzzy Hash: 9FB0927825A540CFCA5DDA0CC0D4E54B3B2FF48A10BC69491F463CBE6AC364EC81C900
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000010.00000002.492581683.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_2100000_march OG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a01119da225e315b075405612d5ceddb45e15ab1b91e9dc2fc9138637cda8dbf
              • Instruction ID: d423e7d8e3b1d011b6385be6b950d1c950a69758382fdbfcbf6f8257127aefa3
              • Opcode Fuzzy Hash: a01119da225e315b075405612d5ceddb45e15ab1b91e9dc2fc9138637cda8dbf
              • Instruction Fuzzy Hash:
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 0040C330
              • #607.MSVBVM60(?,000000FF,00000002), ref: 0040C372
              • __vbaStrVarMove.MSVBVM60(?,?,000000FF,00000002), ref: 0040C37B
              • __vbaStrMove.MSVBVM60(?,?,000000FF,00000002), ref: 0040C385
              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,000000FF,00000002), ref: 0040C394
              • __vbaLenBstr.MSVBVM60(?,?,?,004014C6), ref: 0040C39F
              • __vbaStrToAnsi.MSVBVM60(00000000,?,00000000,?,?,?,004014C6), ref: 0040C3AC
              • __vbaStrToAnsi.MSVBVM60(?,?,00000000,00000000,?,00000000,?,?,?,004014C6), ref: 0040C3BB
              • __vbaSetSystemError.MSVBVM60(00000000,?,?,00000000,00000000,?,00000000,?,?,?,004014C6), ref: 0040C3C6
              • __vbaStrToUnicode.MSVBVM60(?,?,00000000,?,?,00000000,00000000,?,00000000,?,?,?,004014C6), ref: 0040C3D1
              • __vbaStrToUnicode.MSVBVM60(?,00000000,?,?,00000000,?,?,00000000,00000000,?,00000000,?,?,?,004014C6), ref: 0040C3DD
              • __vbaFreeStrList.MSVBVM60(00000002,?,00000000,?,00000000,?,?,00000000,?,?,00000000,00000000,?,00000000,?), ref: 0040C3EC
              • #537.MSVBVM60(00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C3FB
              • __vbaStrMove.MSVBVM60(00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C405
              • __vbaInStr.MSVBVM60(00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C40D
              • __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C422
              • #537.MSVBVM60(00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C436
              • __vbaStrMove.MSVBVM60(00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C440
              • __vbaInStr.MSVBVM60(00000000,00000000,00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C448
              • #616.MSVBVM60(?,-00000001,00000000,00000000,00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?), ref: 0040C45A
              • __vbaStrMove.MSVBVM60(?,-00000001,00000000,00000000,00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?), ref: 0040C464
              • __vbaFreeStr.MSVBVM60(?,-00000001,00000000,00000000,00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?), ref: 0040C46C
              • __vbaStrCat.MSVBVM60(00402A50,?,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C47B
              • __vbaStrMove.MSVBVM60(00402A50,?,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C485
              • __vbaStrCat.MSVBVM60(?,00000000,00402A50,?,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C48E
              • __vbaStrMove.MSVBVM60(?,00000000,00402A50,?,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C498
              • __vbaFreeStr.MSVBVM60(?,00000000,00402A50,?,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C4A0
              • __vbaErrorOverflow.MSVBVM60(00000000,00000000,00000000,?,00000001,00000000,00000000,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C50B
              • __vbaChkstk.MSVBVM60(00000000,004014C6,00000000,?,00000001,?,00000000,?,?,?,004014C6), ref: 0040C52C
              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,004014C6,00000000), ref: 0040C563
              • __vbaHresultCheckObj.MSVBVM60(00000000,004011A0,0040279C,000006F8), ref: 0040C597
              • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0040C5AF
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Move$Free$List$#537AnsiChkstkErrorUnicode$#607#616BstrCheckCopyHresultOverflowSystem
              • String ID:
              • API String ID: 1401190187-0
              • Opcode ID: 75d9e12d4025ff665aff680624f197e169ac2b3f35a384fef7339d418a4cdd82
              • Instruction ID: 43ba1e99afc4c7bb6831e2b235b490e52bf668ee3e3b7d1a55e175ed0f668d86
              • Opcode Fuzzy Hash: 75d9e12d4025ff665aff680624f197e169ac2b3f35a384fef7339d418a4cdd82
              • Instruction Fuzzy Hash: AA412A71D00109ABDF01ABE1CC96FEF7BB8AF04304F14493AB611B61F1DE7A99458B58
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00412635
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 0041264D
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00412658
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00412663
              • #670.MSVBVM60(?,?,?,?,?,004014C6), ref: 0041266C
              • __vbaVarTstEq.MSVBVM60(00008008,?), ref: 00412687
              • __vbaFreeVar.MSVBVM60(00008008,?), ref: 00412693
              • __vbaNew2.MSVBVM60(00402DB0,00415348,00008008,?), ref: 004126B7
              • __vbaLateMemCallLd.MSVBVM60(?,?,mDddaTHbiK109,00000000,?,?,00008008,?), ref: 004126E2
              • __vbaObjVar.MSVBVM60(00000000), ref: 004126EB
              • __vbaObjSetAddref.MSVBVM60(?,00000000,00000000), ref: 004126F5
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,0000000C), ref: 0041271E
              • __vbaFreeObj.MSVBVM60(00000000,?,00402DA0,0000000C), ref: 0041272F
              • __vbaFreeVar.MSVBVM60(00000000,?,00402DA0,0000000C), ref: 00412737
              • __vbaFreeObj.MSVBVM60(0041277F,00008008,?), ref: 00412761
              • __vbaFreeStr.MSVBVM60(0041277F,00008008,?), ref: 00412769
              • __vbaFreeVar.MSVBVM60(0041277F,00008008,?), ref: 00412771
              • __vbaFreeVar.MSVBVM60(0041277F,00008008,?), ref: 00412779
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$#670AddrefCallCheckChkstkCopyHresultLateNew2
              • String ID: Ferskvandsomraaderne4$HSA$mDddaTHbiK109
              • API String ID: 1327288182-1825278231
              • Opcode ID: 926d05d7b37add073712cf40af82349a97cc49529074da5a5ce751f4a91e4093
              • Instruction ID: b8e5183ea26046bdba3ff3c6e95c6c2f9b62bae2e2c04f476e05be9ac922925d
              • Opcode Fuzzy Hash: 926d05d7b37add073712cf40af82349a97cc49529074da5a5ce751f4a91e4093
              • Instruction Fuzzy Hash: 02310B70C00208ABCB14EBE1CD46EDEB7B8AF14748F60452EF411B71E1DBB95945CB18
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00413B74
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00413B9E
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00413BA9
              • #610.MSVBVM60(?,?,?,?,?,004014C6), ref: 00413BB2
              • #661.MSVBVM60(?,00403098,?,?,?,?,?,?,?,?,004014C6), ref: 00413BCB
              • #610.MSVBVM60(?,?,00403098,?,?,?,?,?,?,?,?,004014C6), ref: 00413BD4
              • __vbaVarAdd.MSVBVM60(?,00000002,?,?), ref: 00413C00
              • __vbaVarTstNe.MSVBVM60(00000000,?,00000002,?,?), ref: 00413C06
              • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?,00000000,?,00000002,?,?), ref: 00413C24
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 00413C4E
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00413C87
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402ABC,000000E0), ref: 00413CD1
              • #666.MSVBVM60(?,00000008), ref: 00413D0A
              • __vbaVarMove.MSVBVM60(?,00000008), ref: 00413D15
              • __vbaFreeObj.MSVBVM60(?,00000008), ref: 00413D1D
              • __vbaFreeVar.MSVBVM60(?,00000008), ref: 00413D25
              • __vbaFreeVar.MSVBVM60(00413D7D,?,?,?,?,004014C6), ref: 00413D67
              • __vbaFreeStr.MSVBVM60(00413D7D,?,?,?,?,004014C6), ref: 00413D6F
              • __vbaFreeStr.MSVBVM60(00413D7D,?,?,?,?,004014C6), ref: 00413D77
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$#610Copy$#661#666CheckChkstkHresultListMoveNew2
              • String ID: }=A
              • API String ID: 1255821010-3361414057
              • Opcode ID: a7aa25c433e95d5f7ed8840ce532b04ff59121eb3d55a22c86960f40f3e51d4d
              • Instruction ID: 093f5e0fbf5057ec6d61d855e46b19d98a2cbec8d5aa33af4322b3192fd964b9
              • Opcode Fuzzy Hash: a7aa25c433e95d5f7ed8840ce532b04ff59121eb3d55a22c86960f40f3e51d4d
              • Instruction Fuzzy Hash: 8751ED71900208EFDB10EFA1CD95FDEB7B8AF04304F1045AAE509B71A1DB796A89CF55
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00412CDB
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00412CF3
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00412CFE
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00412D0B
              • #712.MSVBVM60(?,00402F88,00000000,00000001,000000FF,00000000,?,?,?,?,004014C6), ref: 00412D20
              • __vbaStrMove.MSVBVM60(?,00402F88,00000000,00000001,000000FF,00000000,?,?,?,?,004014C6), ref: 00412D2A
              • __vbaStrCmp.MSVBVM60(00402F90,?,?,00402F88,00000000,00000001,000000FF,00000000,?,?,?,?,004014C6), ref: 00412D37
              • __vbaVarDup.MSVBVM60(?,?,?,?,?,?,?,00402F90,?,?,00402F88,00000000,00000001,000000FF,00000000), ref: 00412D54
              • #667.MSVBVM60(?,?,?,?,?,?,?,?,00402F90,?,?,00402F88,00000000,00000001,000000FF,00000000), ref: 00412D5D
              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,00402F90,?,?,00402F88,00000000,00000001,000000FF,00000000), ref: 00412D67
              • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,00402F90,?,?,00402F88,00000000,00000001,000000FF,00000000), ref: 00412D6F
              • __vbaFreeVar.MSVBVM60(00412DA5,00402F90,?,?,00402F88,00000000,00000001,000000FF,00000000,?,?,?,?,004014C6), ref: 00412D87
              • __vbaFreeVar.MSVBVM60(00412DA5,00402F90,?,?,00402F88,00000000,00000001,000000FF,00000000,?,?,?,?,004014C6), ref: 00412D8F
              • __vbaFreeStr.MSVBVM60(00412DA5,00402F90,?,?,00402F88,00000000,00000001,000000FF,00000000,?,?,?,?,004014C6), ref: 00412D97
              • __vbaFreeStr.MSVBVM60(00412DA5,00402F90,?,?,00402F88,00000000,00000001,000000FF,00000000,?,?,?,?,004014C6), ref: 00412D9F
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$Move$#667#712ChkstkCopy
              • String ID: Restproduktet6$cer
              • API String ID: 1621521382-3279456967
              • Opcode ID: 51a2cb30fd4d73b9e94e6b6b7ddd9e0ca597fe406f55029c84651346528b7e16
              • Instruction ID: 69e45d2cfcd18ff73cfd476d852d8b40ed88bd269eddb023bbd4675536ab821e
              • Opcode Fuzzy Hash: 51a2cb30fd4d73b9e94e6b6b7ddd9e0ca597fe406f55029c84651346528b7e16
              • Instruction Fuzzy Hash: A5211830910249ABCB04EBA1DD52EDDBB74AF10748F54493EB002760F1EFB96949CA48
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 004130A1
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 004130CB
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 004130D8
              • #523.MSVBVM60(?,?,?,?,?,004014C6), ref: 004130E0
              • __vbaStrMove.MSVBVM60(?,?,?,?,?,004014C6), ref: 004130EA
              • __vbaStrCmp.MSVBVM60(00402FCC,00000000,?,?,?,?,?,004014C6), ref: 004130F5
              • __vbaFreeStr.MSVBVM60(00402FCC,00000000,?,?,?,?,?,004014C6), ref: 00413109
              • __vbaNew2.MSVBVM60(00402DB0,00415348,00402FCC,00000000,?,?,?,?,?,004014C6), ref: 0041312D
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,0000001C), ref: 00413171
              • __vbaChkstk.MSVBVM60(00000000,?,00402DA0,0000001C), ref: 00413196
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402F08,00000060), ref: 004131CC
              • __vbaFreeObj.MSVBVM60(00000000,?,00402F08,00000060), ref: 004131DD
              • __vbaFreeVar.MSVBVM60(0041320B,00402FCC,00000000,?,?,?,?,?,004014C6), ref: 004131FD
              • __vbaFreeStr.MSVBVM60(0041320B,00402FCC,00000000,?,?,?,?,?,004014C6), ref: 00413205
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$CheckChkstkHresult$#523CopyMoveNew2
              • String ID: HSA$Hin7
              • API String ID: 27921420-659015245
              • Opcode ID: c67f671d4824f325c2a00d634b41a3abf745553271e1ecc3202c89754d5008e4
              • Instruction ID: e5b06f73e85defc90c717eac996c81157e1fe345159a0436afd722830ff3169e
              • Opcode Fuzzy Hash: c67f671d4824f325c2a00d634b41a3abf745553271e1ecc3202c89754d5008e4
              • Instruction Fuzzy Hash: B7411570940208EFCF00EFA5C945BDDBBB5BF14705F24452AF405BB2A1DBB95A86DB18
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 004115CC
              • #646.MSVBVM60(0000000A,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 004115F0
              • __vbaStrMove.MSVBVM60(0000000A,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 004115FA
              • __vbaStrCmp.MSVBVM60(spisestellene,00000000,0000000A,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00411605
              • __vbaFreeStr.MSVBVM60(spisestellene,00000000,0000000A,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00411618
              • __vbaFreeVar.MSVBVM60(spisestellene,00000000,0000000A,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00411620
              • __vbaNew2.MSVBVM60(00402DB0,00415348,spisestellene,00000000,0000000A,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00411644
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,0000004C,?,?,?,?,?,?,?,?,spisestellene,00000000,0000000A), ref: 00411688
              • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,?,?,?,spisestellene,00000000,0000000A), ref: 004116B1
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402E5C,0000001C,?,?,?,?,?,?,?,?,spisestellene,00000000,0000000A), ref: 004116E2
              • __vbaObjSet.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,spisestellene,00000000,0000000A), ref: 00411701
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,spisestellene,00000000,0000000A), ref: 00411709
              • __vbaFreeObj.MSVBVM60(00411741,spisestellene,00000000,0000000A,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 0041173B
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$CheckChkstkHresult$#646MoveNew2
              • String ID: HSA$spisestellene
              • API String ID: 2019826511-4040083204
              • Opcode ID: 8672e1ce3e2c01730a305f817076942b53583e1e885915e656a17d18eab8e145
              • Instruction ID: 5fe6ec2fdcb64fafd825d929ac4f13983a0be50c74be57eaf57d36824d6874c9
              • Opcode Fuzzy Hash: 8672e1ce3e2c01730a305f817076942b53583e1e885915e656a17d18eab8e145
              • Instruction Fuzzy Hash: 3F41F470D50308EFDB00EFD1C955BEEBBB5AF04704F24452AE501BB2A1D7BA5946CB19
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00412303
              • #631.MSVBVM60(FGFG,00000002,00000002,?,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 0041232E
              • __vbaStrMove.MSVBVM60(FGFG,00000002,00000002,?,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00412338
              • __vbaStrCmp.MSVBVM60(00402F04,00000000,FGFG,00000002,00000002), ref: 00412343
              • __vbaFreeStr.MSVBVM60(00402F04,00000000,FGFG,00000002,00000002), ref: 00412357
              • __vbaFreeVar.MSVBVM60(00402F04,00000000,FGFG,00000002,00000002), ref: 0041235F
              • __vbaNew2.MSVBVM60(00401E74,00415010,00402F04,00000000,FGFG,00000002,00000002), ref: 00412383
              • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,00402F04,00000000,FGFG,00000002,00000002), ref: 004123B0
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000108,?,?,?,?,?,?,?,?,00402F04,00000000,FGFG,00000002), ref: 004123E5
              • #666.MSVBVM60(?,00000008,?,?,?,?,?,?,?,?,00402F04,00000000,FGFG,00000002,00000002), ref: 00412412
              • __vbaVarMove.MSVBVM60(?,00000008,?,?,?,?,?,?,?,?,00402F04,00000000,FGFG,00000002,00000002), ref: 0041241D
              • __vbaFreeObj.MSVBVM60(?,00000008,?,?,?,?,?,?,?,?,00402F04,00000000,FGFG,00000002,00000002), ref: 00412425
              • __vbaFreeVar.MSVBVM60(?,00000008,?,?,?,?,?,?,?,?,00402F04,00000000,FGFG,00000002,00000002), ref: 0041242D
              • __vbaFreeVar.MSVBVM60(00412465,00402F04,00000000,FGFG,00000002,00000002), ref: 0041245F
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$Move$#631#666CheckChkstkHresultNew2
              • String ID: FGFG
              • API String ID: 704291291-2759163656
              • Opcode ID: a7eaa0eaf7fe46571da90a485917c02c76e9570b96954f5f7e0d1b201f75b8b0
              • Instruction ID: 1348005867bcb56c377947b6fac47b7d3265205b25ed005b72191f799e6df17c
              • Opcode Fuzzy Hash: a7eaa0eaf7fe46571da90a485917c02c76e9570b96954f5f7e0d1b201f75b8b0
              • Instruction Fuzzy Hash: E0410871940208AFCF00EFE1C995BDDBBB8BF18704F14452AF405BB2A1DBBA5985CB59
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00413EFE
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00413F28
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00413F33
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00413F3E
              • __vbaNew2.MSVBVM60(00402DB0,00415348,?,?,?,?,004014C6), ref: 00413F56
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,00000014), ref: 00413F9A
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DC0,00000130), ref: 00413FDB
              • __vbaStrMove.MSVBVM60 ref: 00413FF9
              • __vbaFreeObj.MSVBVM60 ref: 00414001
              • __vbaFreeStr.MSVBVM60(0041403F), ref: 00414021
              • __vbaFreeVar.MSVBVM60(0041403F), ref: 00414029
              • __vbaFreeStr.MSVBVM60(0041403F), ref: 00414031
              • __vbaFreeVar.MSVBVM60(0041403F), ref: 00414039
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$CheckHresult$ChkstkCopyMoveNew2
              • String ID: HSA
              • API String ID: 3448594947-293960443
              • Opcode ID: 3383e6a8fb6001976ccdeb9d226c2eea9e708bb05f3108114c29e65f223af2c5
              • Instruction ID: 3965eb5541186d9e3fd1075af2c0ba8b23b1f2b3ec1b0926a082b8a15874e2d2
              • Opcode Fuzzy Hash: 3383e6a8fb6001976ccdeb9d226c2eea9e708bb05f3108114c29e65f223af2c5
              • Instruction Fuzzy Hash: 6441C570D00208DFCB00EFD5C955BDDBBB4BF18309F14852AE4157B2A1DBB96A8ACB54
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00412EF1
              • __vbaVarDup.MSVBVM60 ref: 00412F29
              • #563.MSVBVM60(?), ref: 00412F32
              • __vbaFreeVar.MSVBVM60(?), ref: 00412F48
              • __vbaNew2.MSVBVM60(00402DB0,00415348,?), ref: 00412F6C
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,0000001C,?,?,?,?,?,?,?), ref: 00412FB0
              • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,?), ref: 00412FD2
              • __vbaCastObj.MSVBVM60(?,00402EE0,?,?,?,?,?,?,?), ref: 00412FE8
              • __vbaObjSet.MSVBVM60(?,00000000,?,00402EE0,?,?,?,?,?,?,?), ref: 00412FF2
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402F08,00000058,?,?,?,?,?,?,?), ref: 0041301B
              • __vbaFreeObjList.MSVBVM60(00000002,?,?,?,?,?,?,?,?,?,?,?), ref: 00413033
              • __vbaFreeObj.MSVBVM60(00413066,?), ref: 00413060
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$CheckChkstkHresult$#563CastListNew2
              • String ID: HSA
              • API String ID: 4064276064-293960443
              • Opcode ID: bd06443c3f1632cb0f12b1bc094df87c4b677b7c87bb16fad8fb999cc30f709a
              • Instruction ID: 8c285f0052f7ee2791d4b4e28a6b00bcf7454a03f830b03d8b2a1e9821a72987
              • Opcode Fuzzy Hash: bd06443c3f1632cb0f12b1bc094df87c4b677b7c87bb16fad8fb999cc30f709a
              • Instruction Fuzzy Hash: CB41E170900618EFCB00EFD4C94ABDEBBB8BF08745F10452AF401BB2A1D7B95986DB59
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 0041407C
              • __vbaVarDup.MSVBVM60 ref: 004140B4
              • #564.MSVBVM60(?,?), ref: 004140C1
              • __vbaHresultCheck.MSVBVM60(00000000,?,?,?,?,?), ref: 004140D2
              • __vbaVarTstNe.MSVBVM60(00008002,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004140FC
              • __vbaFreeVarList.MSVBVM60(00000002,?,?,00008002,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041410F
              • __vbaHresultCheckObj.MSVBVM60(00000000,00401460,0040276C,00000160), ref: 00414150
              • __vbaNew2.MSVBVM60(00402DB0,00415348), ref: 00414177
              • __vbaObjSet.MSVBVM60(?,?,GAARDHUSET), ref: 004141B9
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,00000040), ref: 004141E2
              • __vbaFreeObj.MSVBVM60(00000000,?,00402DA0,00000040), ref: 004141F9
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$CheckHresult$Free$#564ChkstkListNew2
              • String ID: GAARDHUSET$HSA
              • API String ID: 851593083-2964492987
              • Opcode ID: f3474c0c2beaf9490de55d71a4bb8be780808cdc08f33bef5e71a6b54484271b
              • Instruction ID: f41ee5d753e93676b5138cc95c73b84fa4cbcc48cf45b7652e970b0ba98902de
              • Opcode Fuzzy Hash: f3474c0c2beaf9490de55d71a4bb8be780808cdc08f33bef5e71a6b54484271b
              • Instruction Fuzzy Hash: D6510770D00218EFDB10DFA5C849BDDBBB8BB14704F20856AE509B72A1DB795A89CF58
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00412493
              • __vbaVarDup.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 004124B9
              • #563.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 004124C2
              • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 004124D8
              • __vbaNew2.MSVBVM60(00402DB0,00415348,?), ref: 004124FC
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,0000001C,?,?,?,?,?,?), ref: 00412540
              • __vbaChkstk.MSVBVM60(?,?,?,?,?,?), ref: 00412565
              • __vbaCastObj.MSVBVM60(?,00402EE0,?,?,?,?,?,?), ref: 0041257B
              • __vbaObjSet.MSVBVM60(?,00000000,?,00402EE0,?,?,?,?,?,?), ref: 00412585
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402F08,00000058,?,?,?,?,?,?), ref: 004125AE
              • __vbaFreeObjList.MSVBVM60(00000002,?,?,?,?,?,?,?,?,?,?), ref: 004125C6
              • __vbaFreeObj.MSVBVM60(004125F9,?), ref: 004125F3
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$CheckChkstkHresult$#563CastListNew2
              • String ID: HSA
              • API String ID: 4064276064-293960443
              • Opcode ID: 21390c43d88d2e1f1048f87a93f5e9d506f96e34b691568b3dc78f71824cfa1f
              • Instruction ID: 1b85c62744a4e3610a7a2c3e7991478a83d02ce6b2c1230d40da447b3bed7837
              • Opcode Fuzzy Hash: 21390c43d88d2e1f1048f87a93f5e9d506f96e34b691568b3dc78f71824cfa1f
              • Instruction Fuzzy Hash: 1541E470D00618AFCB00DFD1C986BDEBBB9BF08745F24442AF401BB1A1D7B95955DB18
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00411434
              • __vbaNew2.MSVBVM60(00402DB0,00415348,?,?,?,?,004014C6), ref: 0041146B
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,00000014), ref: 004114AF
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DC0,00000128), ref: 004114F6
              • __vbaFreeObj.MSVBVM60(00000000,?,00402DC0,00000128), ref: 0041151C
              • __vbaChkstk.MSVBVM60(00000000,?,00402DC0,00000128), ref: 00411548
              • __vbaChkstk.MSVBVM60(00000000,?,00402DC0,00000128), ref: 00411559
              • __vbaLateMemCall.MSVBVM60(?,IXie2utHRx0hSBLrnl2lM4fNpqMGsjbukbu73oU84,00000002), ref: 00411571
              • __vbaFreeObj.MSVBVM60(00411592), ref: 0041158C
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Chkstk$CheckFreeHresult$CallLateNew2
              • String ID: HSA$IXie2utHRx0hSBLrnl2lM4fNpqMGsjbukbu73oU84$Triorchis
              • API String ID: 3443168283-3629061477
              • Opcode ID: 28352fdc2bf43e92c8d29c880d75b2a3155a7e921acb13d461446cf4fed1a66a
              • Instruction ID: a04313485f6c9a6e1c6e7e673818826ed8dab57f8a768214b5a687b4b7aac699
              • Opcode Fuzzy Hash: 28352fdc2bf43e92c8d29c880d75b2a3155a7e921acb13d461446cf4fed1a66a
              • Instruction Fuzzy Hash: 3C412774D00308EFCB10DFA5C949BDEBBB5BF08704F20852AE505BB2A1DBB95985DB58
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 004127AE
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 004127D8
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 004127E3
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 004127EE
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 004127F9
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 00412811
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041283E
              • __vbaChkstk.MSVBVM60(?,00000000), ref: 00412857
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AAC,000001B0), ref: 0041288E
              • __vbaFreeObj.MSVBVM60 ref: 004128A5
              • __vbaFreeVar.MSVBVM60(004128DB), ref: 004128BD
              • __vbaFreeVar.MSVBVM60(004128DB), ref: 004128C5
              • __vbaFreeVar.MSVBVM60(004128DB), ref: 004128CD
              • __vbaFreeVar.MSVBVM60(004128DB), ref: 004128D5
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$Chkstk$CheckHresultNew2
              • String ID:
              • API String ID: 2096563423-0
              • Opcode ID: f63c9d142257c49606896ad5de17b2c4fc7c45eabb1b596ac6a2810d03d1b6ee
              • Instruction ID: 51fce569daac9b000fdf8a2d3f8868c4c6881ddf1b2f89bb75533612a9ab8d9f
              • Opcode Fuzzy Hash: f63c9d142257c49606896ad5de17b2c4fc7c45eabb1b596ac6a2810d03d1b6ee
              • Instruction Fuzzy Hash: C5310630900208DFCB10EFA5C995BDDBBB5BF14308F50496EF405BB2A1DBBA6A45CB48
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00413DB7
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00413DCF
              • #693.MSVBVM60(00402D7C,?,?,?,?,004014C6), ref: 00413DD9
              • __vbaHresultCheckObj.MSVBVM60(?,?,0040276C,00000160,?,?,?,?,004014C6), ref: 00413E19
              • __vbaNew2.MSVBVM60(00402DB0,00415348,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00413E3A
              • __vbaObjSet.MSVBVM60(?,?,stvendtes,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00413E6D
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,00000040,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00413E96
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00413EA7
              • __vbaFreeStr.MSVBVM60(00413ECF,00402D7C,?,?,?,?,004014C6), ref: 00413EC9
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$CheckFreeHresult$#693ChkstkCopyNew2
              • String ID: HSA$stvendtes
              • API String ID: 663426343-3571590191
              • Opcode ID: bc92d0e9f33bcc557ccc80453930d75329ca1324e7228c3cc07857dc1f7c84b0
              • Instruction ID: bafae0f77cf21ae2ad6b48ae06931612411d394296e492b563bc48efda18ccc3
              • Opcode Fuzzy Hash: bc92d0e9f33bcc557ccc80453930d75329ca1324e7228c3cc07857dc1f7c84b0
              • Instruction Fuzzy Hash: 5331E870940309EFCB00EF95C94ABDEBBB5EF08716F20452AF501B72A0D7B95A85CB59
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00411A65
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00411A8F
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 00411AA7
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00411AD4
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,00000000), ref: 00411AFD
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00411B2A
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AF8,00000188), ref: 00411B5F
              • __vbaChkstk.MSVBVM60 ref: 00411B70
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A8C,000001EC), ref: 00411BAA
              • __vbaFreeStr.MSVBVM60 ref: 00411BBB
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00411BCA
              • __vbaFreeStr.MSVBVM60(00411BFD,?,?,004014C6), ref: 00411BF7
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$CheckChkstkHresultNew2$CopyList
              • String ID:
              • API String ID: 897315418-0
              • Opcode ID: a9c92f27b6d300a240f4ff8dea0719f2f2768b146f6a55f71697d83b2232d10e
              • Instruction ID: 15a12843fe16d59a9410e598b34cc931a5654bb9a015de64b6d6205cc9272b3e
              • Opcode Fuzzy Hash: a9c92f27b6d300a240f4ff8dea0719f2f2768b146f6a55f71697d83b2232d10e
              • Instruction Fuzzy Hash: 2C51D774900608EFCB10EFD0C895BDDBBB9BF09304F10456AF501BB2A1DB796985DB59
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00412155
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 0041216D
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 00412185
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 004121B2
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,00000000), ref: 004121DB
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00412208
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000050), ref: 00412237
              • __vbaChkstk.MSVBVM60 ref: 00412248
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AF8,000001EC), ref: 00412282
              • __vbaFreeStr.MSVBVM60 ref: 00412293
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 004122A2
              • __vbaFreeStr.MSVBVM60(004122D5), ref: 004122CF
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$CheckChkstkHresultNew2$CopyList
              • String ID:
              • API String ID: 897315418-0
              • Opcode ID: 442d0be792afeb568cac3133116538382786c5871fe6370b7809b3d93082ce4e
              • Instruction ID: 9c39b4a93efd2b246c38cd9a70899190072e546f4003c1938a1a71c11fb8842f
              • Opcode Fuzzy Hash: 442d0be792afeb568cac3133116538382786c5871fe6370b7809b3d93082ce4e
              • Instruction Fuzzy Hash: A541F970A00608EFCF10EFD0D995BDEBBB9BF08304F14452AF501BB2A1C7B959959B59
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00413250
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 0041327A
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00413285
              • __vbaAryConstruct2.MSVBVM60(?,00402FEC,00000008,?,?,?,?,004014C6), ref: 00413295
              • #708.MSVBVM60(?,00006008,00402FE4,000000FF,00000000), ref: 004132BE
              • __vbaAryVar.MSVBVM60(00002008,?,?,00006008,00402FE4,000000FF,00000000), ref: 004132CC
              • __vbaAryCopy.MSVBVM60(?,?,00002008,?,?,00006008,00402FE4,000000FF,00000000), ref: 004132DC
              • __vbaFreeVar.MSVBVM60(?,?,00002008,?,?,00006008,00402FE4,000000FF,00000000), ref: 004132E4
              • __vbaFreeVar.MSVBVM60(00413326,?,?,00002008,?,?,00006008,00402FE4,000000FF,00000000), ref: 004132FC
              • __vbaFreeVar.MSVBVM60(00413326,?,?,00002008,?,?,00006008,00402FE4,000000FF,00000000), ref: 00413304
              • __vbaAryDestruct.MSVBVM60(00000000,?,00413326,?,?,00002008,?,?,00006008,00402FE4,000000FF,00000000), ref: 0041330F
              • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,?,00413326,?,?,00002008,?,?,00006008,00402FE4,000000FF,00000000), ref: 00413320
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$Destruct$#708ChkstkConstruct2Copy
              • String ID:
              • API String ID: 2065015019-0
              • Opcode ID: a7e98dca05792bbfb9294d5c7de89a4f31ce9d1e896feb65d7e1ff97153676e1
              • Instruction ID: 5fd3a0376af6b4831edb9c1784ca8953cfd3ba7f9d9b9afee1427de3561f7e29
              • Opcode Fuzzy Hash: a7e98dca05792bbfb9294d5c7de89a4f31ce9d1e896feb65d7e1ff97153676e1
              • Instruction Fuzzy Hash: C021CA71D40208AADB10EFE5CC86FDDBBB8AF04704F50852BF515BB1E1DB78A6498B54
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00411D42
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00411D6C
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00411D77
              • __vbaNew2.MSVBVM60(00402DB0,00415348,?,?,?,?,004014C6), ref: 00411D8F
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DA0,00000014), ref: 00411DD3
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402DC0,00000070), ref: 00411E0E
              • __vbaFreeObj.MSVBVM60 ref: 00411E27
              • __vbaFreeStr.MSVBVM60(00411E4D), ref: 00411E3F
              • __vbaFreeStr.MSVBVM60(00411E4D), ref: 00411E47
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$CheckCopyHresult$ChkstkNew2
              • String ID: HSA
              • API String ID: 1408746023-293960443
              • Opcode ID: d35a7267d7bab395125bd5154981e6b88e69a57707672391361fe45ad145b51b
              • Instruction ID: 694568201b26c24086f10fa9518c170dc1d2100792ed9ab73e5cf16a42cd3a42
              • Opcode Fuzzy Hash: d35a7267d7bab395125bd5154981e6b88e69a57707672391361fe45ad145b51b
              • Instruction Fuzzy Hash: DA31E074900208EFCB00EFA5D985BDDBBB4AF08705F20852AF501B72A0D779A986CB58
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 0041291D
              • #575.MSVBVM60(?,00000002,?,?,?,?,?,?,?,?,?,004014C6), ref: 00412945
              • __vbaVarTstNe.MSVBVM60(00008002,?), ref: 00412960
              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00008002,?), ref: 00412973
              • __vbaVarDup.MSVBVM60 ref: 00412997
              • #666.MSVBVM60(?,?), ref: 004129A4
              • __vbaVarMove.MSVBVM60(?,?), ref: 004129AF
              • __vbaFreeVar.MSVBVM60(?,?), ref: 004129B7
              • __vbaFreeVar.MSVBVM60(004129E3), ref: 004129DD
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$#575#666ChkstkListMove
              • String ID: anita
              • API String ID: 4276905740-2406036547
              • Opcode ID: af7119eaba4bc636348d1176c3786ffe1308f5c1b253a375e4f381587595821a
              • Instruction ID: 5abc7c8de29c695bcb5b1c9eee020a3b71707b42540106494db17bed3b415df4
              • Opcode Fuzzy Hash: af7119eaba4bc636348d1176c3786ffe1308f5c1b253a375e4f381587595821a
              • Instruction Fuzzy Hash: 8121B7B191025CAADB00EBE1CD8AEEEB7BCBB14704F54452EF101B71A1EB795909CB58
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 0041336D
              • __vbaVarDup.MSVBVM60 ref: 004133AB
              • #717.MSVBVM60(?,?,00000003,00000000), ref: 004133BC
              • __vbaVarTstNe.MSVBVM60(00008008,?,?,?,00000003,00000000), ref: 004133E0
              • __vbaFreeVarList.MSVBVM60(00000002,?,?,00008008,?,?,?,00000003,00000000), ref: 004133F6
              • __vbaNew2.MSVBVM60(00401E74,00415010), ref: 0041344A
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00413483
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000158), ref: 004134CD
              • #595.MSVBVM60(00000008,00000000,0000000A,0000000A,0000000A), ref: 00413510
              • __vbaFreeObj.MSVBVM60(00000008,00000000,0000000A,0000000A,0000000A), ref: 00413518
              • __vbaFreeVarList.MSVBVM60(00000004,00000008,0000000A,0000000A,0000000A,00000008,00000000,0000000A,0000000A,0000000A), ref: 0041352F
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$List$#595#717CheckChkstkHresultNew2
              • String ID:
              • API String ID: 4190091149-0
              • Opcode ID: d6f87d3d237522cbeb74a8414c4d70100449a3fd00935880fea83f72616c7313
              • Instruction ID: f328f09ebe807ae89d3453d8b797ffa87591f0cba10625b7ef86292635b940a3
              • Opcode Fuzzy Hash: d6f87d3d237522cbeb74a8414c4d70100449a3fd00935880fea83f72616c7313
              • Instruction Fuzzy Hash: E651E8B1D00218EFDB11DF90C845BDEBBB8BF08704F5085AAE105BB2A1DB799A45CF56
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00412B40
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 00412B65
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00412B92
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,00000000), ref: 00412BBB
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00412BE8
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AAC,00000048), ref: 00412C17
              • __vbaChkstk.MSVBVM60 ref: 00412C28
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A8C,000001EC), ref: 00412C62
              • __vbaFreeStr.MSVBVM60 ref: 00412C73
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00412C82
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$CheckChkstkFreeHresultNew2$List
              • String ID:
              • API String ID: 2926503497-0
              • Opcode ID: abbc911938682a9fde818ee73a22d18d20318346af242846ad90b0b427b7b0a8
              • Instruction ID: 3f7934e47d377584765f31b918ed1486fa1ad541a3f189e52025c8c828815165
              • Opcode Fuzzy Hash: abbc911938682a9fde818ee73a22d18d20318346af242846ad90b0b427b7b0a8
              • Instruction Fuzzy Hash: 90413C70900608EFCB10EFD0C995FDEBBB9AF08304F10452AF501B72A1D7B95981DB99
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 0041426A
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00414294
              • __vbaStrComp.MSVBVM60(00000000,00402D7C,004030DC,?,?,?,?,004014C6), ref: 004142A5
              • __vbaNew2.MSVBVM60(00401E74,00415010,00000000,00402D7C,004030DC,?,?,?,?,004014C6), ref: 004142C7
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 004142F4
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,00000108), ref: 00414329
              • #600.MSVBVM60(00000008,00000002), ref: 00414354
              • __vbaFreeObj.MSVBVM60(00000008,00000002), ref: 0041435F
              • __vbaFreeVar.MSVBVM60(00000008,00000002), ref: 00414367
              • __vbaFreeVar.MSVBVM60(00414396,00000000,00402D7C,004030DC,?,?,?,?,004014C6), ref: 00414390
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$#600CheckChkstkCompHresultNew2
              • String ID:
              • API String ID: 1824550057-0
              • Opcode ID: 563363eb8870310f5406d2de26f922f5d67c499fa5e611d6632c604bd8c79d5b
              • Instruction ID: ab0271479d9fd62e0c322ded4ee0be442299890642da9117d55afccfb72c866e
              • Opcode Fuzzy Hash: 563363eb8870310f5406d2de26f922f5d67c499fa5e611d6632c604bd8c79d5b
              • Instruction Fuzzy Hash: 90310770A40208EFCB00EFE5C959BDDBBB4AF48704F10842AF405BB2A1D7795986CB49
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00412DD3
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00412DEB
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00412DF6
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 00412E0E
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00412E3B
              • __vbaChkstk.MSVBVM60(?,00000000), ref: 00412E54
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A8C,00000200), ref: 00412E8B
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00412E9C
              • __vbaFreeStr.MSVBVM60(00412EC2), ref: 00412EB4
              • __vbaFreeVar.MSVBVM60(00412EC2), ref: 00412EBC
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$Chkstk$CheckCopyHresultNew2
              • String ID:
              • API String ID: 763330518-0
              • Opcode ID: 1c59f506fcd07a2097f901d8d18e6edc1694e66ef7e10e8c8bd7b23c6af108bb
              • Instruction ID: 3a682e4e2336f8fa0d0f715fecdc0c2a98c759ebaf6614acf20fc9f93ea4de51
              • Opcode Fuzzy Hash: 1c59f506fcd07a2097f901d8d18e6edc1694e66ef7e10e8c8bd7b23c6af108bb
              • Instruction Fuzzy Hash: E4314D70900308EFCB14EF91C996FDDBBB4AF08714F14492AF401B72A1CBB95945CB59
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00411377
              • __vbaI4Str.MSVBVM60(00402D70,?,?,?,?,004014C6), ref: 004113A0
              • #697.MSVBVM60(00000000,00402D70,?,?,?,?,004014C6), ref: 004113A6
              • __vbaStrMove.MSVBVM60(00000000,00402D70,?,?,?,?,004014C6), ref: 004113B0
              • __vbaStrCmp.MSVBVM60(00402D7C,00000000,00000000,00402D70,?,?,?,?,004014C6), ref: 004113BB
              • __vbaFreeStr.MSVBVM60(00402D7C,00000000,00000000,00402D70,?,?,?,?,004014C6), ref: 004113CF
              • #580.MSVBVM60(HJDE,00000001,00402D7C,00000000,00000000,00402D70,?,?,?,?,004014C6), ref: 004113E3
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$#580#697ChkstkFreeMove
              • String ID: HJDE
              • API String ID: 1745895909-2420807878
              • Opcode ID: 191659900c395f655622b457f642a9924e153bc13b2ea6346444ab01fff29487
              • Instruction ID: a9d854f457f509e41ee73a495307342d01ac95b26604af36960ecbbd0c6a6c14
              • Opcode Fuzzy Hash: 191659900c395f655622b457f642a9924e153bc13b2ea6346444ab01fff29487
              • Instruction Fuzzy Hash: 48017530A40209ABCB00BBA5CC46FAE7AB8AF00B04F14453BB501F71E1DABD98418799
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 0041451A
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 0041453F
              • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 0041456C
              • __vbaChkstk.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 00414585
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AF8,000001EC,?,?,?,?,?,?,?,?,?,?,004014C6), ref: 004145C1
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004014C6), ref: 004145D2
              Strings
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Chkstk$CheckFreeHresultNew2
              • String ID: Fierding
              • API String ID: 3189907775-2487161434
              • Opcode ID: 2c39dbfbed31bb04488af8aafec03f7044c56c601af5e4e73a0b5d7d7e9580cd
              • Instruction ID: 94dbcea938caceef3de172e441513509b2a2e7ed72a0855dfbea25bf12fdc542
              • Opcode Fuzzy Hash: 2c39dbfbed31bb04488af8aafec03f7044c56c601af5e4e73a0b5d7d7e9580cd
              • Instruction Fuzzy Hash: DC216D70A40608EFCB00DF95C895BDDBBB9EF49714F60452AF501BB2A0C7B95A80DF69
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00412A12
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00412A3C
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 00412A54
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00412A81
              • __vbaChkstk.MSVBVM60(?,00000000), ref: 00412A97
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402ABC,000001C0), ref: 00412ACE
              • __vbaFreeObj.MSVBVM60 ref: 00412ADF
              • __vbaFreeStr.MSVBVM60(00412AFE), ref: 00412AF8
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$ChkstkFree$CheckCopyHresultNew2
              • String ID:
              • API String ID: 2888502551-0
              • Opcode ID: 9d8ec28c09ac5323956b174d0e9d89a93be222c3eecbb7e10a44741bd5c35610
              • Instruction ID: 639bbd743891c022fc813efb4fa65b065905c59b934d3e8f52eb3d7f5adb053f
              • Opcode Fuzzy Hash: 9d8ec28c09ac5323956b174d0e9d89a93be222c3eecbb7e10a44741bd5c35610
              • Instruction Fuzzy Hash: F4314A30900208EFCB10EF91C999BDDBBB5BF08704F50846AF401BB2A0CBB95985CF99
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 0041193C
              • __vbaVarDup.MSVBVM60(?,?,?,?,004014C6), ref: 00411966
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 0041197E
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 004119AB
              • __vbaChkstk.MSVBVM60(?,00000000), ref: 004119C4
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A9C,000001B0), ref: 004119FB
              • __vbaFreeObj.MSVBVM60 ref: 00411A0C
              • __vbaFreeVar.MSVBVM60(00411A2A), ref: 00411A24
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$ChkstkFree$CheckHresultNew2
              • String ID:
              • API String ID: 2807847221-0
              • Opcode ID: 5319177e48b671fd447492f310eadbfb12fddb78db49abf348fb66627586bd11
              • Instruction ID: ee6bdefe8b03201f9af1867f2851c72aa8322a30027d9cdc305ea573b6534c12
              • Opcode Fuzzy Hash: 5319177e48b671fd447492f310eadbfb12fddb78db49abf348fb66627586bd11
              • Instruction Fuzzy Hash: 46313670A10248EFCB00EFA1C899BDDBBB4BF08304F10456AF501BB2A0DBB96941CB59
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00411C38
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 00411C62
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 00411C7A
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00411CA7
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AAC,000001BC), ref: 00411CD8
              • __vbaFreeObj.MSVBVM60 ref: 00411CE9
              • __vbaFreeStr.MSVBVM60(00411D07), ref: 00411D01
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$CheckChkstkCopyHresultNew2
              • String ID:
              • API String ID: 2810356740-0
              • Opcode ID: c689be13148d7d97952d23c8ca15574de37f5d739943ad336758d680d82648ea
              • Instruction ID: 8b559e2c974dc90a981f84e6da7762af1da8cef9ba2aad0a763a9a9b08aca624
              • Opcode Fuzzy Hash: c689be13148d7d97952d23c8ca15574de37f5d739943ad336758d680d82648ea
              • Instruction Fuzzy Hash: 57213670A50208EFCB00EF94C899FDDBBB4BF08704F10856AF501BB2A1DB795941DB99
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00414616
              • __vbaStrCopy.MSVBVM60(?,?,?,?,004014C6), ref: 0041462E
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 00414646
              • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,004014C6), ref: 00414673
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A8C,000001F8,?,?,?,?,?,?,?,?,?,004014C6), ref: 004146A4
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,004014C6), ref: 004146B5
              • __vbaFreeStr.MSVBVM60(004146D4,?,?,?,?,?,?,?,?,?,004014C6), ref: 004146CE
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$CheckChkstkCopyHresultNew2
              • String ID:
              • API String ID: 2810356740-0
              • Opcode ID: f1e8f8421268710681b4d7b909abff5a9342223c74ae886be63e77a42720da72
              • Instruction ID: 4f42bb803efc79e3231652cbf8864f74bfc6b433eba0a0af2af481c6e3572edc
              • Opcode Fuzzy Hash: f1e8f8421268710681b4d7b909abff5a9342223c74ae886be63e77a42720da72
              • Instruction Fuzzy Hash: AF212A70950208EFCB00DF90C995FDDBBB4BB59708F20056AF001772A1CB7D5941CB69
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00414460
              • #610.MSVBVM60(?,?,?,?,?,004014C6), ref: 00414488
              • #552.MSVBVM60(?,?,00000001,?,?,?,?,?,004014C6), ref: 00414497
              • __vbaVarMove.MSVBVM60(?,?,00000001,?,?,?,?,?,004014C6), ref: 004144A2
              • __vbaFreeVar.MSVBVM60(?,?,00000001,?,?,?,?,?,004014C6), ref: 004144AA
              • __vbaFreeVar.MSVBVM60(004144D2,?,?,00000001,?,?,?,?,?,004014C6), ref: 004144CC
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$Free$#552#610ChkstkMove
              • String ID:
              • API String ID: 3185064854-0
              • Opcode ID: c83aee9bd768ded6b6e2b428e1268cbb818669aab70bf8aefb8a521eeed86d30
              • Instruction ID: cec1c0d65296340e5066192e2bdeccca19a0566d1bbeeee6a083544c1faff110
              • Opcode Fuzzy Hash: c83aee9bd768ded6b6e2b428e1268cbb818669aab70bf8aefb8a521eeed86d30
              • Instruction Fuzzy Hash: E901FB71D00248BBCB00EFA5C946FCEBBB8EF44748F50856AF105B71A1DB79AA048B58
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00411E87
              • #675.MSVBVM60(?,?,?,?,?,?,?,?,0000000A,0000000A), ref: 00411ED9
              • __vbaFpR8.MSVBVM60(?,?,?,?,?,?,?,?,0000000A,0000000A), ref: 00411EDE
              • __vbaFreeVarList.MSVBVM60(00000002,0000000A,0000000A,?,?,?,?,?,?,?,?,0000000A,0000000A), ref: 00411F0E
              • #568.MSVBVM60(0000005B), ref: 00411F20
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$#568#675ChkstkFreeList
              • String ID:
              • API String ID: 1539022685-0
              • Opcode ID: 9a9be583502cb285b3682d77fbbda0261ee2c1253ed11eb1aabbc1434aaccf6d
              • Instruction ID: 3135df5fad623a4d64432aa5dc4d96b7d496623d0eee38701d86474cd722be43
              • Opcode Fuzzy Hash: 9a9be583502cb285b3682d77fbbda0261ee2c1253ed11eb1aabbc1434aaccf6d
              • Instruction Fuzzy Hash: EC1160B1850708AADB01DFD1CD56FEEBBBCEB00B04F14462FF140A6290D7B955808B69
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaChkstk.MSVBVM60(?,004014C6), ref: 00411779
              • __vbaNew2.MSVBVM60(00401E74,00415010,?,?,?,?,004014C6), ref: 0041179E
              • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,004014C6), ref: 004117CB
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402AF8,000001E8,?,?,?,?,?,?,004014C6), ref: 004117FC
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,004014C6), ref: 0041180D
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: __vba$CheckChkstkFreeHresultNew2
              • String ID:
              • API String ID: 4127847336-0
              • Opcode ID: 015c44f7705ab732d5046b414572d1a6288d58afd63225a76acf5ab488483512
              • Instruction ID: 3fd82a4276b81878de2ad4df0b6b3077b79da55f67544d0e1ab08b2a6a74b8fd
              • Opcode Fuzzy Hash: 015c44f7705ab732d5046b414572d1a6288d58afd63225a76acf5ab488483512
              • Instruction Fuzzy Hash: 61112E74940609EFCB10EF91C956BEEBBB8EB08704F60456AE101B72A0C7795981DBA9
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaFreeVar.MSVBVM60 ref: 0041354B
              • __vbaFreeStr.MSVBVM60 ref: 00413553
              • __vbaFreeObj.MSVBVM60 ref: 0041355B
              • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 00413572
              Memory Dump Source
              • Source File: 00000010.00000002.491340106.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000010.00000002.491326222.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000010.00000002.491388105.0000000000415000.00000004.00020000.sdmp Download File
              • Associated: 00000010.00000002.491407524.0000000000417000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_400000_march OG.jbxd
              Similarity
              • API ID: Free__vba$List
              • String ID:
              • API String ID: 2192533141-0
              • Opcode ID: 224582a13ea8c32cc541a3df5c212782702287b61164d9f0fa4b3d08184edd22
              • Instruction ID: e06834df7ba98d5cb87bfe0573b2770e41a1c11be254f6c502cb2ca90ff59a8c
              • Opcode Fuzzy Hash: 224582a13ea8c32cc541a3df5c212782702287b61164d9f0fa4b3d08184edd22
              • Instruction Fuzzy Hash: AFE07D73C001089BDB05EBD5CCA2DDE73BCAB14304F54457AE512B60A1EA35AA49C664
              Uniqueness

              Uniqueness Score: -1.00%