Loading ...

Play interactive tourEdit tour

Windows Analysis Report Invoice-NBM01557.exe

Overview

General Information

Sample Name:Invoice-NBM01557.exe
Analysis ID:457884
MD5:32c099a7b9a5cfe1920c5e27d4c26f87
SHA1:efd4d3670d59054a5e616d8cdc72ffc7239a39ca
SHA256:cdf3ed20864deb7d7c28a188e14bd8369855e44f9cc3a8abf187146e9ce847b0
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
GuLoader behavior detected
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Executable has a suspicious name (potential lure to open the executable)
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • Invoice-NBM01557.exe (PID: 3164 cmdline: 'C:\Users\user\Desktop\Invoice-NBM01557.exe' MD5: 32C099A7B9A5CFE1920C5E27D4C26F87)
    • RegAsm.exe (PID: 5044 cmdline: 'C:\Users\user\Desktop\Invoice-NBM01557.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • RegAsm.exe (PID: 5048 cmdline: 'C:\Users\user\Desktop\Invoice-NBM01557.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • RegAsm.exe (PID: 1112 cmdline: 'C:\Users\user\Desktop\Invoice-NBM01557.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • RegAsm.exe (PID: 5164 cmdline: 'C:\Users\user\Desktop\Invoice-NBM01557.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • RegAsm.exe (PID: 5196 cmdline: 'C:\Users\user\Desktop\Invoice-NBM01557.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
      • conhost.exe (PID: 5332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://spuredge.com/BarristerRicky_WVgORQXWI61.bin"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000000.197691242.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
    00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: Invoice-NBM01557.exeMalware Configuration Extractor: GuLoader {"Payload URL": "https://spuredge.com/BarristerRicky_WVgORQXWI61.bin"}
      Multi AV Scanner detection for domain / URLShow sources
      Source: spuredge.comVirustotal: Detection: 12%Perma Link
      Source: https://spuredge.com/Virustotal: Detection: 9%Perma Link
      Multi AV Scanner detection for submitted fileShow sources
      Source: Invoice-NBM01557.exeVirustotal: Detection: 78%Perma Link
      Source: Invoice-NBM01557.exeMetadefender: Detection: 51%Perma Link
      Source: Invoice-NBM01557.exeReversingLabs: Detection: 92%
      Source: Invoice-NBM01557.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: unknownHTTPS traffic detected: 164.90.131.131:443 -> 192.168.2.3:49745 version: TLS 1.2

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: https://spuredge.com/BarristerRicky_WVgORQXWI61.bin
      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: unknownDNS traffic detected: queries for: spuredge.com
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: http://apps.identrust.c
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
      Source: Invoice-NBM01557.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
      Source: Invoice-NBM01557.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: http://cps.letsencrypt.org0
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
      Source: Invoice-NBM01557.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
      Source: Invoice-NBM01557.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
      Source: Invoice-NBM01557.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
      Source: Invoice-NBM01557.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
      Source: Invoice-NBM01557.exeString found in binary or memory: http://ocsp.digicert.com0C
      Source: Invoice-NBM01557.exeString found in binary or memory: http://ocsp.digicert.com0O
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: http://r3.i.lencr.org/0
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: http://r3.o.lencr.org0
      Source: Invoice-NBM01557.exeString found in binary or memory: http://www.digicert.com/CPS0
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: http://x1.c.lencr.org/0
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: http://x1.i.lencr.org/0
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: https://spuredge.com/
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: https://spuredge.com/4
      Source: RegAsm.exeString found in binary or memory: https://spuredge.com/BarristerRicky_WVgORQXWI61.bin
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: https://spuredge.com/BarristerRicky_WVgORQXWI61.bin0
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: https://spuredge.com/BarristerRicky_WVgORQXWI61.bin8
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: https://spuredge.com/BarristerRicky_WVgORQXWI61.binH
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: https://spuredge.com/M
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: https://spuredge.com/_
      Source: RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpString found in binary or memory: https://spuredge.com/h
      Source: Invoice-NBM01557.exeString found in binary or memory: https://www.digicert.com/CPS0
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
      Source: unknownHTTPS traffic detected: 164.90.131.131:443 -> 192.168.2.3:49745 version: TLS 1.2
      Source: Invoice-NBM01557.exe, 00000000.00000002.467409461.00000000007BA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

      System Summary:

      barindex
      Executable has a suspicious name (potential lure to open the executable)Show sources
      Source: Invoice-NBM01557.exeStatic file information: Suspicious name
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: Invoice-NBM01557.exe
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess Stats: CPU usage > 98%
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F1140D NtProtectVirtualMemory,23_2_00F1140D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A4FE NtAllocateVirtualMemory,23_2_00F0A4FE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A457 NtAllocateVirtualMemory,23_2_00F0A457
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F10C21 NtProtectVirtualMemory,23_2_00F10C21
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A414 NtAllocateVirtualMemory,23_2_00F0A414
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A591 NtAllocateVirtualMemory,23_2_00F0A591
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A680 NtAllocateVirtualMemory,23_2_00F0A680
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A26D NtAllocateVirtualMemory,23_2_00F0A26D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A63E NtAllocateVirtualMemory,23_2_00F0A63E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A3B9 NtAllocateVirtualMemory,23_2_00F0A3B9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A785 NtAllocateVirtualMemory,23_2_00F0A785
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A731 NtAllocateVirtualMemory,23_2_00F0A731
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A30F NtAllocateVirtualMemory,23_2_00F0A30F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A09323_2_00F0A093
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F1140D23_2_00F1140D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F00E6123_2_00F00E61
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F11A5523_2_00F11A55
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0AFAA23_2_00F0AFAA
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0BFAE23_2_00F0BFAE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F050F123_2_00F050F1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F054F523_2_00F054F5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0D4F523_2_00F0D4F5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F104F923_2_00F104F9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0F4F923_2_00F0F4F9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A4FE23_2_00F0A4FE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F108E123_2_00F108E1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0DCE923_2_00F0DCE9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0E0D123_2_00F0E0D1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F124D523_2_00F124D5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0B4DD23_2_00F0B4DD
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F04CCD23_2_00F04CCD
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F064CD23_2_00F064CD
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F11CB123_2_00F11CB1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0ECB523_2_00F0ECB5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0ACA323_2_00F0ACA3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F044A323_2_00F044A3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F024A523_2_00F024A5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F018AE23_2_00F018AE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0E49623_2_00F0E496
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0208623_2_00F02086
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01C8F23_2_00F01C8F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0B07323_2_00F0B073
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0507D23_2_00F0507D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0B06423_2_00F0B064
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0586923_2_00F05869
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0605523_2_00F06055
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0545523_2_00F05455
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0905623_2_00F09056
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A45723_2_00F0A457
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0B45A23_2_00F0B45A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01C4123_2_00F01C41
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0644323_2_00F06443
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F04C4F23_2_00F04C4F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F1043523_2_00F10435
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F10C2123_2_00F10C21
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0FC1123_2_00F0FC11
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A41423_2_00F0A414
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F1201E23_2_00F1201E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0D5F123_2_00F0D5F1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0DDF123_2_00F0DDF1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01DF523_2_00F01DF5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F019F623_2_00F019F6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F019F923_2_00F019F9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F025F923_2_00F025F9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F109E123_2_00F109E1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F051D423_2_00F051D4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F055C623_2_00F055C6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0F1C623_2_00F0F1C6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F04DB723_2_00F04DB7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F049BE23_2_00F049BE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F045A523_2_00F045A5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A59123_2_00F0A591
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0E99E23_2_00F0E99E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F1058A23_2_00F1058A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01D8D23_2_00F01D8D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F11D6123_2_00F11D61
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0B56A23_2_00F0B56A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0656F23_2_00F0656F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0555D23_2_00F0555D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0194223_2_00F01942
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0492923_2_00F04929
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0212D23_2_00F0212D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0B10723_2_00F0B107
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0DEF923_2_00F0DEF9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01AFB23_2_00F01AFB
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F10EE923_2_00F10EE9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0E6EE23_2_00F0E6EE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F106D023_2_00F106D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F06ED323_2_00F06ED3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0EED523_2_00F0EED5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F012C523_2_00F012C5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F04ACA23_2_00F04ACA
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0B2B623_2_00F0B2B6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F03EA123_2_00F03EA1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F102A223_2_00F102A2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F11AAD23_2_00F11AAD
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0F29323_2_00F0F293
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0529723_2_00F05297
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0229923_2_00F02299
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0E69923_2_00F0E699
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0F29B23_2_00F0F29B
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F1068523_2_00F10685
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F10A7523_2_00F10A75
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F05E7623_2_00F05E76
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01A7923_2_00F01A79
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A26D23_2_00F0A26D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0B25323_2_00F0B253
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F04E5523_2_00F04E55
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0D64523_2_00F0D645
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F1224D23_2_00F1224D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0FE3523_2_00F0FE35
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0F62123_2_00F0F621
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0FE1923_2_00F0FE19
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F11E1A23_2_00F11E1A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0220423_2_00F02204
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F1060523_2_00F10605
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0EA0A23_2_00F0EA0A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F00FF523_2_00F00FF5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F103F423_2_00F103F4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F023F823_2_00F023F8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F123E323_2_00F123E3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0F3E523_2_00F0F3E5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F047E623_2_00F047E6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F09FD123_2_00F09FD1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0B3D123_2_00F0B3D1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F053D523_2_00F053D5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F013D623_2_00F013D6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F10FDD23_2_00F10FDD
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F11FC523_2_00F11FC5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F023CA23_2_00F023CA
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F11BB123_2_00F11BB1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A3B923_2_00F0A3B9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F063A123_2_00F063A1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F047A123_2_00F047A1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F033A923_2_00F033A9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0EBAA23_2_00F0EBAA
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0979E23_2_00F0979E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0238223_2_00F02382
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0F37223_2_00F0F372
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0637A23_2_00F0637A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0536023_2_00F05360
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F10F6A23_2_00F10F6A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F04F5523_2_00F04F55
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0335D23_2_00F0335D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F1074123_2_00F10741
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F02F3223_2_00F02F32
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01F3923_2_00F01F39
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F04F3B23_2_00F04F3B
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0532523_2_00F05325
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F11B0A23_2_00F11B0A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0A30F23_2_00F0A30F
      Source: Invoice-NBM01557.exeStatic PE information: invalid certificate
      Source: Invoice-NBM01557.exe, 00000000.00000002.467082489.0000000000650000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs Invoice-NBM01557.exe
      Source: Invoice-NBM01557.exe, 00000000.00000000.197742468.0000000000462000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamemasterer.exe vs Invoice-NBM01557.exe
      Source: Invoice-NBM01557.exeBinary or memory string: OriginalFilenamemasterer.exex vs Invoice-NBM01557.exe
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
      Source: Invoice-NBM01557.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: classification engineClassification label: mal100.troj.evad.winEXE@12/0@1/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5332:120:WilError_01
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeFile created: C:\Users\user\AppData\Local\Temp\~DFC8D15DAE0C85FFC3.TMPJump to behavior
      Source: Invoice-NBM01557.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Invoice-NBM01557.exeVirustotal: Detection: 78%
      Source: Invoice-NBM01557.exeMetadefender: Detection: 51%
      Source: Invoice-NBM01557.exeReversingLabs: Detection: 92%
      Source: unknownProcess created: C:\Users\user\Desktop\Invoice-NBM01557.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe'
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe'
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe'
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe'
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe'
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe' Jump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe' Jump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe' Jump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe' Jump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe' Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 00000000.00000000.197691242.0000000000401000.00000020.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeCode function: 0_2_00404C6D push 00000000h; retf 0_2_00404C70
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeCode function: 0_2_00404653 pushfd ; iretd 0_2_0040466D
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeCode function: 0_2_00404364 push dword ptr [esi]; iretd 0_2_00404368
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeCode function: 0_2_004037BD pushfd ; iretd 0_2_004037C5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F00E61 push edi; iretd 23_2_00F011B7
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion:

      barindex
      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F104F9 23_2_00F104F9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F024A5 23_2_00F024A5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F018AE 23_2_00F018AE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F02086 23_2_00F02086
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01C8F 23_2_00F01C8F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F06055 23_2_00F06055
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01C41 23_2_00F01C41
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F06443 23_2_00F06443
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F10435 23_2_00F10435
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01DF5 23_2_00F01DF5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F019F6 23_2_00F019F6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F019F9 23_2_00F019F9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F05D8A 23_2_00F05D8A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F1058A 23_2_00F1058A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01D8D 23_2_00F01D8D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01942 23_2_00F01942
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0212D 23_2_00F0212D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01AFB 23_2_00F01AFB
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F106D0 23_2_00F106D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F102A2 LoadLibraryA,23_2_00F102A2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F02299 23_2_00F02299
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F10685 23_2_00F10685
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01A79 23_2_00F01A79
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F02204 23_2_00F02204
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F10605 23_2_00F10605
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F103F4 23_2_00F103F4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F023F8 23_2_00F023F8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F023CA 23_2_00F023CA
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F063A1 23_2_00F063A1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F02382 23_2_00F02382
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0637A LoadLibraryA,23_2_00F0637A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F01F39 23_2_00F01F39
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F04F3B LoadLibraryA,23_2_00F04F3B
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 000000000058097C second address: 000000000058097C instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 000000000058A7A9 second address: 000000000058A854 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a mov esi, dword ptr [ebp+00000235h] 0x00000010 test edx, eax 0x00000012 mov dword ptr [ebp+00000148h], 00000000h 0x0000001c add ebx, 04h 0x0000001f mov dword ptr [ebp+00000224h], ecx 0x00000025 mov ecx, ebx 0x00000027 cmp bh, dh 0x00000029 push ecx 0x0000002a jmp 00007F8754A67B82h 0x0000002c cmp bl, bl 0x0000002e mov ecx, dword ptr [ebp+00000224h] 0x00000034 push B55527F2h 0x00000039 sub dword ptr [esp], 0BBED90Bh 0x00000040 pushad 0x00000041 mov bx, C0A2h 0x00000045 cmp bx, C0A2h 0x0000004a jne 00007F8754A5E5B7h 0x00000050 popad 0x00000051 xor dword ptr [esp], 244C7A83h 0x00000058 cmp ch, ah 0x0000005a pushad 0x0000005b rdtsc
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 000000000058A854 second address: 000000000058A854 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000580AA4 second address: 0000000000580ACB instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp dl, 00000011h 0x0000000d push 2C063A5Bh 0x00000012 test ax, 00000BDCh 0x00000016 test di, 9AB7h 0x0000001b push B0C249E6h 0x00000020 test dl, FFFFFFDCh 0x00000023 test bx, ax 0x00000026 pushad 0x00000027 rdtsc
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000580ACB second address: 0000000000580B49 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a push 85327120h 0x0000000f push 61685288h 0x00000014 jmp 00007F8754A685EEh 0x00000016 test al, F1h 0x00000018 test ax, 0000EAC5h 0x0000001c push 0F0C7812h 0x00000021 test di, 7C66h 0x00000026 test dl, FFFFFFE7h 0x00000029 push 06F5AB6Ch 0x0000002e test bx, ax 0x00000031 pushad 0x00000032 rdtsc
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000580B49 second address: 0000000000580B49 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 000000000059219D second address: 000000000059219D instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000590C66 second address: 0000000000590C66 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000581732 second address: 0000000000581732 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000582354 second address: 0000000000582354 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 00000000005826C3 second address: 00000000005826C3 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000582828 second address: 0000000000582828 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000588B7C second address: 0000000000588B7C instructions:
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000F0B183 second address: 0000000000F0B1AD instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor ebx, 4F20D102h 0x00000010 test bl, dl 0x00000012 xor ebx, 508983A2h 0x00000018 push ebx 0x00000019 mov ebx, dword ptr [ebp+00000261h] 0x0000001f cmp al, dl 0x00000021 mov dword ptr [ebp+0000022Dh], esi 0x00000027 mov esi, eax 0x00000029 pushad 0x0000002a rdtsc
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000F0B1AD second address: 0000000000F0B1AD instructions:
      Tries to detect Any.runShow sources
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: Invoice-NBM01557.exe, 00000000.00000002.467409461.00000000007BA000.00000004.00000020.sdmp, RegAsm.exe, 00000017.00000002.465256164.0000000000BD0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 000000000058097C second address: 000000000058097C instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 000000000058A7A9 second address: 000000000058A854 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a mov esi, dword ptr [ebp+00000235h] 0x00000010 test edx, eax 0x00000012 mov dword ptr [ebp+00000148h], 00000000h 0x0000001c add ebx, 04h 0x0000001f mov dword ptr [ebp+00000224h], ecx 0x00000025 mov ecx, ebx 0x00000027 cmp bh, dh 0x00000029 push ecx 0x0000002a jmp 00007F8754A67B82h 0x0000002c cmp bl, bl 0x0000002e mov ecx, dword ptr [ebp+00000224h] 0x00000034 push B55527F2h 0x00000039 sub dword ptr [esp], 0BBED90Bh 0x00000040 pushad 0x00000041 mov bx, C0A2h 0x00000045 cmp bx, C0A2h 0x0000004a jne 00007F8754A5E5B7h 0x00000050 popad 0x00000051 xor dword ptr [esp], 244C7A83h 0x00000058 cmp ch, ah 0x0000005a pushad 0x0000005b rdtsc
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 000000000058A854 second address: 000000000058A854 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000580AA4 second address: 0000000000580ACB instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp dl, 00000011h 0x0000000d push 2C063A5Bh 0x00000012 test ax, 00000BDCh 0x00000016 test di, 9AB7h 0x0000001b push B0C249E6h 0x00000020 test dl, FFFFFFDCh 0x00000023 test bx, ax 0x00000026 pushad 0x00000027 rdtsc
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000580ACB second address: 0000000000580B49 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a push 85327120h 0x0000000f push 61685288h 0x00000014 jmp 00007F8754A685EEh 0x00000016 test al, F1h 0x00000018 test ax, 0000EAC5h 0x0000001c push 0F0C7812h 0x00000021 test di, 7C66h 0x00000026 test dl, FFFFFFE7h 0x00000029 push 06F5AB6Ch 0x0000002e test bx, ax 0x00000031 pushad 0x00000032 rdtsc
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000580B49 second address: 0000000000580B49 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 000000000059219D second address: 000000000059219D instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000590C66 second address: 0000000000590C66 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000581732 second address: 0000000000581732 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000581EE7 second address: 000000000058202A instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b cmp cl, dl 0x0000000d xor dword ptr [esp], 46C0A8E7h 0x00000014 cmp dx, ax 0x00000017 add dword ptr [esp], 4E6B1662h 0x0000001e cmp ah, bh 0x00000020 add dword ptr [esp], 081A73C5h 0x00000027 nop 0x00000028 mov dword ptr [ebp+00000210h], esi 0x0000002e mov esi, 37BD0A28h 0x00000033 cmp al, dl 0x00000035 cmp ax, ax 0x00000038 xor esi, 8DC6BC3Ah 0x0000003e cmp bh, dh 0x00000040 xor esi, E7896D65h 0x00000046 test bl, bl 0x00000048 xor esi, 5DF2DB77h 0x0000004e jmp 00007F8754A67B82h 0x00000050 cmp bl, dl 0x00000052 test edx, eax 0x00000054 push esi 0x00000055 test bh, bh 0x00000057 mov esi, dword ptr [ebp+00000210h] 0x0000005d cmp ch, ch 0x0000005f push F195925Ah 0x00000064 xor dword ptr [esp], 68357457h 0x0000006b cmp bh, dh 0x0000006d xor dword ptr [esp], 7C9227D0h 0x00000074 test bl, bl 0x00000076 xor dword ptr [esp], E532C1DDh 0x0000007d pushad 0x0000007e mov si, BA90h 0x00000082 cmp si, BA90h 0x00000087 jne 00007F8754A66E3Ch 0x0000008d popad 0x0000008e pushad 0x0000008f mov ah, 59h 0x00000091 cmp ah, 00000059h 0x00000094 jne 00007F8754A6CA38h 0x0000009a popad 0x0000009b mov dword ptr [ebp+0000027Eh], edi 0x000000a1 jmp 00007F8754A67B7Eh 0x000000a3 pushad 0x000000a4 lfence 0x000000a7 rdtsc
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000582354 second address: 0000000000582354 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 00000000005826C3 second address: 00000000005826C3 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000582828 second address: 0000000000582828 instructions:
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeRDTSC instruction interceptor: First address: 0000000000588B7C second address: 0000000000588B7C instructions:
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000F01EE7 second address: 0000000000F0202A instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b cmp cl, dl 0x0000000d xor dword ptr [esp], 46C0A8E7h 0x00000014 cmp dx, ax 0x00000017 add dword ptr [esp], 4E6B1662h 0x0000001e cmp ah, bh 0x00000020 add dword ptr [esp], 081A73C5h 0x00000027 nop 0x00000028 mov dword ptr [ebp+00000210h], esi 0x0000002e mov esi, 37BD0A28h 0x00000033 cmp al, dl 0x00000035 cmp ax, ax 0x00000038 xor esi, 8DC6BC3Ah 0x0000003e cmp bh, dh 0x00000040 xor esi, E7896D65h 0x00000046 test bl, bl 0x00000048 xor esi, 5DF2DB77h 0x0000004e jmp 00007F8754A685F2h 0x00000050 cmp bl, dl 0x00000052 test edx, eax 0x00000054 push esi 0x00000055 test bh, bh 0x00000057 mov esi, dword ptr [ebp+00000210h] 0x0000005d cmp ch, ch 0x0000005f push F195925Ah 0x00000064 xor dword ptr [esp], 68357457h 0x0000006b cmp bh, dh 0x0000006d xor dword ptr [esp], 7C9227D0h 0x00000074 test bl, bl 0x00000076 xor dword ptr [esp], E532C1DDh 0x0000007d pushad 0x0000007e mov si, BA90h 0x00000082 cmp si, BA90h 0x00000087 jne 00007F8754A678ACh 0x0000008d popad 0x0000008e pushad 0x0000008f mov ah, 59h 0x00000091 cmp ah, 00000059h 0x00000094 jne 00007F8754A6D4A8h 0x0000009a popad 0x0000009b mov dword ptr [ebp+0000027Eh], edi 0x000000a1 jmp 00007F8754A685EEh 0x000000a3 pushad 0x000000a4 lfence 0x000000a7 rdtsc
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000F0B183 second address: 0000000000F0B1AD instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor ebx, 4F20D102h 0x00000010 test bl, dl 0x00000012 xor ebx, 508983A2h 0x00000018 push ebx 0x00000019 mov ebx, dword ptr [ebp+00000261h] 0x0000001f cmp al, dl 0x00000021 mov dword ptr [ebp+0000022Dh], esi 0x00000027 mov esi, eax 0x00000029 pushad 0x0000002a rdtsc
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000F0B1AD second address: 0000000000F0B1AD instructions:
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F11A55 rdtsc 23_2_00F11A55
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeAPI coverage: 1.9 %
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 9.3 %
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3476Thread sleep time: -630000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: Invoice-NBM01557.exe, 00000000.00000002.467409461.00000000007BA000.00000004.00000020.sdmp, RegAsm.exe, 00000017.00000002.465256164.0000000000BD0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

      Anti Debugging:

      barindex
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess queried: DebugPortJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F11A55 rdtsc 23_2_00F11A55
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0C059 LdrInitializeThunk,23_2_00F0C059
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0F090 mov eax, dword ptr fs:[00000030h]23_2_00F0F090
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F10435 mov eax, dword ptr fs:[00000030h]23_2_00F10435
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0E9E3 mov eax, dword ptr fs:[00000030h]23_2_00F0E9E3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F095C2 mov eax, dword ptr fs:[00000030h]23_2_00F095C2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F102A2 mov eax, dword ptr fs:[00000030h]23_2_00F102A2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F103F4 mov eax, dword ptr fs:[00000030h]23_2_00F103F4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F0637A mov eax, dword ptr fs:[00000030h]23_2_00F0637A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 23_2_00F04F3B mov eax, dword ptr fs:[00000030h]23_2_00F04F3B
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe' Jump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe' Jump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe' Jump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe' Jump to behavior
      Source: C:\Users\user\Desktop\Invoice-NBM01557.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Invoice-NBM01557.exe' Jump to behavior
      Source: Invoice-NBM01557.exe, 00000000.00000002.470790714.0000000000D40000.00000002.00000001.sdmp, RegAsm.exe, 00000017.00000002.467566779.00000000017C0000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: Invoice-NBM01557.exe, 00000000.00000002.470790714.0000000000D40000.00000002.00000001.sdmp, RegAsm.exe, 00000017.00000002.467566779.00000000017C0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: Invoice-NBM01557.exe, 00000000.00000002.470790714.0000000000D40000.00000002.00000001.sdmp, RegAsm.exe, 00000017.00000002.467566779.00000000017C0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: Invoice-NBM01557.exe, 00000000.00000002.470790714.0000000000D40000.00000002.00000001.sdmp, RegAsm.exe, 00000017.00000002.467566779.00000000017C0000.00000002.00000001.sdmpBinary or memory string: Progmanlock

      Stealing of Sensitive Information:

      barindex
      GuLoader behavior detectedShow sources
      Source: Initial fileSignature Results: GuLoader behavior

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationDLL Side-Loading1Process Injection12Virtualization/Sandbox Evasion22Input Capture1Security Software Discovery621Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Process Injection12LSASS MemoryVirtualization/Sandbox Evasion22Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery31SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Invoice-NBM01557.exe79%VirustotalBrowse
      Invoice-NBM01557.exe54%MetadefenderBrowse
      Invoice-NBM01557.exe93%ReversingLabsWin32.Trojan.AgentTesla

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      0.0.Invoice-NBM01557.exe.400000.0.unpack100%AviraHEUR/AGEN.1140082Download File
      0.2.Invoice-NBM01557.exe.400000.0.unpack100%AviraHEUR/AGEN.1140082Download File

      Domains

      SourceDetectionScannerLabelLink
      spuredge.com12%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      https://spuredge.com/40%Avira URL Cloudsafe
      https://spuredge.com/BarristerRicky_WVgORQXWI61.bin00%Avira URL Cloudsafe
      https://spuredge.com/9%VirustotalBrowse
      https://spuredge.com/0%Avira URL Cloudsafe
      http://cps.letsencrypt.org00%URL Reputationsafe
      https://spuredge.com/M0%Avira URL Cloudsafe
      http://x1.c.lencr.org/00%URL Reputationsafe
      http://x1.i.lencr.org/00%URL Reputationsafe
      https://spuredge.com/h0%Avira URL Cloudsafe
      https://spuredge.com/BarristerRicky_WVgORQXWI61.binH0%Avira URL Cloudsafe
      http://r3.o.lencr.org00%URL Reputationsafe
      https://spuredge.com/_0%Avira URL Cloudsafe
      https://spuredge.com/BarristerRicky_WVgORQXWI61.bin0%Avira URL Cloudsafe
      http://apps.identrust.c0%Avira URL Cloudsafe
      https://spuredge.com/BarristerRicky_WVgORQXWI61.bin80%Avira URL Cloudsafe
      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
      http://r3.i.lencr.org/00%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      spuredge.com
      164.90.131.131
      truetrueunknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      https://spuredge.com/BarristerRicky_WVgORQXWI61.bintrue
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      https://spuredge.com/4RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://spuredge.com/BarristerRicky_WVgORQXWI61.bin0RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://spuredge.com/RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmptrue
      • 9%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://cps.letsencrypt.org0RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      unknown
      https://spuredge.com/MRegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://x1.c.lencr.org/0RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      unknown
      http://x1.i.lencr.org/0RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      unknown
      https://spuredge.com/hRegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://spuredge.com/BarristerRicky_WVgORQXWI61.binHRegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://r3.o.lencr.org0RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      unknown
      https://spuredge.com/_RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://apps.identrust.cRegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://spuredge.com/BarristerRicky_WVgORQXWI61.bin8RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://cps.root-x1.letsencrypt.org0RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      unknown
      http://r3.i.lencr.org/0RegAsm.exe, 00000017.00000002.466091020.00000000010C9000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      unknown

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      164.90.131.131
      spuredge.comUnited States
      14061DIGITALOCEAN-ASNUStrue

      General Information

      Joe Sandbox Version:33.0.0 White Diamond
      Analysis ID:457884
      Start date:02.08.2021
      Start time:13:33:04
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 6m 11s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:Invoice-NBM01557.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:28
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@12/0@1/1
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 75.6% (good quality ratio 38.9%)
      • Quality average: 31.6%
      • Quality standard deviation: 34.7%
      HCA Information:Failed
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Excluded IPs from analysis (whitelisted): 104.42.151.234, 40.88.32.150, 20.82.209.183, 23.211.4.86, 20.54.110.249, 40.112.88.60, 80.67.82.211, 80.67.82.235, 20.82.210.154
      • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.

      Simulations

      Behavior and APIs

      TimeTypeDescription
      13:35:41API Interceptor64x Sleep call for process: RegAsm.exe modified

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      164.90.131.131HSBC Customer Information.exeGet hashmaliciousBrowse
        HSBC Payment Advice.exeGet hashmaliciousBrowse
          Invoice-NBM01557.exeGet hashmaliciousBrowse

            Domains

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            spuredge.comHSBC Customer Information.exeGet hashmaliciousBrowse
            • 164.90.131.131
            HSBC Payment Advice.exeGet hashmaliciousBrowse
            • 164.90.131.131
            Invoice-NBM01557.exeGet hashmaliciousBrowse
            • 164.90.131.131

            ASN

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            DIGITALOCEAN-ASNUSw4DEaimFEtGet hashmaliciousBrowse
            • 64.227.61.197
            fJn3N6piJMGet hashmaliciousBrowse
            • 68.183.107.28
            1sHut1OhEUGet hashmaliciousBrowse
            • 68.183.107.28
            dIuTSU7cWxGet hashmaliciousBrowse
            • 68.183.107.28
            Z0MWp1rWrIGet hashmaliciousBrowse
            • 46.101.74.107
            140oGL81Z9Get hashmaliciousBrowse
            • 46.101.74.107
            WVS6wDRacfGet hashmaliciousBrowse
            • 68.183.107.28
            30Bzshze5JGet hashmaliciousBrowse
            • 68.183.107.28
            t9ZTYARTkbGet hashmaliciousBrowse
            • 46.101.74.107
            u9vk6372pGGet hashmaliciousBrowse
            • 46.101.74.107
            McDGsbifWsGet hashmaliciousBrowse
            • 46.101.74.107
            K0UbuGy6TLGet hashmaliciousBrowse
            • 46.101.74.107
            7D2r6OGZYrGet hashmaliciousBrowse
            • 68.183.107.28
            uiInKzkLQxGet hashmaliciousBrowse
            • 188.226.156.33
            0wagQPl5blGet hashmaliciousBrowse
            • 167.174.106.204
            tajmWT78GhGet hashmaliciousBrowse
            • 167.172.53.230
            X7S5qVt2kUGet hashmaliciousBrowse
            • 188.166.148.220
            z8TB44PMEDGet hashmaliciousBrowse
            • 188.166.148.220
            iGyh86ydRbGet hashmaliciousBrowse
            • 188.166.148.220
            JyZtWJg3OUGet hashmaliciousBrowse
            • 188.166.148.220

            JA3 Fingerprints

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            37f463bf4616ecd445d4a1937da06e19o12nY1xwUl.exeGet hashmaliciousBrowse
            • 164.90.131.131
            R4qgfTvaiK.exeGet hashmaliciousBrowse
            • 164.90.131.131
            Zaobz-rdbmw-xdw-f.exeGet hashmaliciousBrowse
            • 164.90.131.131
            AR2rPMLtaN.exeGet hashmaliciousBrowse
            • 164.90.131.131
            NEW PO pdf.exeGet hashmaliciousBrowse
            • 164.90.131.131
            BFE85B846350851DD4F83DFED498AE60F85D4129329C2.exeGet hashmaliciousBrowse
            • 164.90.131.131
            Aging invoice.htmlGet hashmaliciousBrowse
            • 164.90.131.131
            R5L9IoaG67.exeGet hashmaliciousBrowse
            • 164.90.131.131
            flJrVwWebP.exeGet hashmaliciousBrowse
            • 164.90.131.131
            QfVER41Fwx.exeGet hashmaliciousBrowse
            • 164.90.131.131
            1A263B2603212FF1E492D9E0C718F12601789E27EAABA.exeGet hashmaliciousBrowse
            • 164.90.131.131
            mbVrdKm3zX.exeGet hashmaliciousBrowse
            • 164.90.131.131
            bHC6bZhkMz.exeGet hashmaliciousBrowse
            • 164.90.131.131
            5qW61eKDTp.exeGet hashmaliciousBrowse
            • 164.90.131.131
            WWzUml7m53.exeGet hashmaliciousBrowse
            • 164.90.131.131
            e7V79qGVJT.exeGet hashmaliciousBrowse
            • 164.90.131.131
            it2TiN2UtR.exeGet hashmaliciousBrowse
            • 164.90.131.131
            4Dm89IWqe9.exeGet hashmaliciousBrowse
            • 164.90.131.131
            5mr8riiH5q.exeGet hashmaliciousBrowse
            • 164.90.131.131
            YoKh9rD5xR.exeGet hashmaliciousBrowse
            • 164.90.131.131

            Dropped Files

            No context

            Created / dropped Files

            No created / dropped files found

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):5.070814493721219
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.15%
            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:Invoice-NBM01557.exe
            File size:406648
            MD5:32c099a7b9a5cfe1920c5e27d4c26f87
            SHA1:efd4d3670d59054a5e616d8cdc72ffc7239a39ca
            SHA256:cdf3ed20864deb7d7c28a188e14bd8369855e44f9cc3a8abf187146e9ce847b0
            SHA512:92718e45b150eefc458f782955fdb63983c2ea1792703fb63d3aa6387a1d73046b3d2f52d4105a214ee779143350a1e90fe3808c9a5fa12b7124ba1fbf223876
            SSDEEP:6144:X5JSVcNqNU2DqySM7cCezPu71By3WqCADi52ovelDv:y+N5XySpCoPu71BoND22x
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...&(.`.....................`......D.............@................

            File Icon

            Icon Hash:1d1d0b481b2d1e7b

            Static PE Info

            General

            Entrypoint:0x401944
            Entrypoint Section:.text
            Digitally signed:true
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            DLL Characteristics:
            Time Stamp:0x60E42826 [Tue Jul 6 09:53:42 2021 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:2a8f8fe86b805d013a793966040bd3e6

            Authenticode Signature

            Signature Valid:false
            Signature Issuer:E=SURROGATKAFFES@positionslyset.JOR, CN=TRIBUN, OU=Liminess, O=Howe, L=Afrikaniseringerne, S=AANDINGSLUFTS, C=WF
            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
            Error Number:-2146762487
            Not Before, Not After
            • 7/6/2021 2:53:43 AM 7/6/2022 2:53:43 AM
            Subject Chain
            • E=SURROGATKAFFES@positionslyset.JOR, CN=TRIBUN, OU=Liminess, O=Howe, L=Afrikaniseringerne, S=AANDINGSLUFTS, C=WF
            Version:3
            Thumbprint MD5:124522CD2089964485F61C096F9A0D19
            Thumbprint SHA-1:601B5785D599363311C7F6646A07536D03A81D48
            Thumbprint SHA-256:C196911BAAA100ED78BD9FEA9A748CD038154CEFAECF4159513CE925FB28650A
            Serial:00

            Entrypoint Preview

            Instruction
            push 00408534h
            call 00007F8754B45A33h
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            xor byte ptr [eax], al
            add byte ptr [eax], al
            inc eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add ch, dh
            cld
            aam 4Ah
            push 00000045h
            inc ebp
            mov ch, C7h
            xor ecx, dword ptr [edi+55E7E214h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add dword ptr [eax], eax
            add byte ptr [eax], al
            inc edx
            add byte ptr [esi], al
            push eax
            add dword ptr [ecx], 62h
            jc 00007F8754B45AA8h
            insb
            jnc 00007F8754B45AA7h
            jc 00007F8754B45AB0h
            add byte ptr [eax], al
            les ebp, fword ptr [ecx]
            push cs
            add eax, dword ptr [eax]
            add byte ptr [eax], al
            add bh, bh
            int3
            xor dword ptr [eax], eax
            or al, C4h
            jnc 00007F8754B45ABEh
            pushfd
            lodsb

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x2c8340x28.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2f0000x3376c.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x620000x1478
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
            IMAGE_DIRECTORY_ENTRY_IAT0x10000x1f0.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x2be9c0x2c000False0.359996448864data5.19267836508IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .data0x2d0000x12080x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .rsrc0x2f0000x3376c0x34000False0.254216120793data4.44258915763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_ICON0x2f0e80x3334cdata
            RT_GROUP_ICON0x624340x14data
            RT_VERSION0x624480x324dataEnglishUnited States

            Imports

            DLLImport
            MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaObjSet, __vbaOnError, __vbaCyAdd, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaErase, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaVarTstEq, __vbaAryConstruct2, __vbaI2I4, _adj_fpatan, __vbaLateIdCallLd, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaFpCmpCy, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaFileOpen, __vbaNew2, __vbaVar2Vec, __vbaInStr, __vbaR8Str, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaLateMemCall, __vbaVarDup, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, __vbaAryCopy, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

            Version Infos

            DescriptionData
            Translation0x0409 0x04b0
            LegalCopyrightVeeva Systems
            InternalNamemasterer
            FileVersion1.00
            CompanyNameVeeva Systems
            LegalTrademarksVeeva Systems
            CommentsVeeva Systems
            ProductNameVeeva Systems
            ProductVersion1.00
            FileDescriptionVeeva Systems
            OriginalFilenamemasterer.exe

            Possible Origin

            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States

            Network Behavior

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Aug 2, 2021 13:35:40.789267063 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:40.892699003 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:40.894449949 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:40.927284002 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.028748989 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:41.029031038 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:41.029071093 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:41.029109001 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:41.029135942 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:41.029208899 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.029263973 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.030519962 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:41.034167051 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.139246941 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.240998983 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:41.241269112 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.280236959 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.383631945 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:41.383760929 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.511296034 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.613480091 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:41.613603115 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.729620934 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.831511974 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:41.831629038 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:41.948720932 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:42.050656080 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:42.051207066 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:42.167452097 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:42.269274950 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:42.272334099 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:42.386699915 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:42.491229057 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:42.491507053 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:42.605616093 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:42.710289001 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:42.710567951 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:42.824354887 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:42.926182985 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:42.926501989 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:43.043262959 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:43.149116993 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:43.149346113 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:43.262417078 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:43.367554903 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:43.367763042 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:43.480498075 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:43.584925890 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:43.585114956 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:43.702326059 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:43.804044008 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:43.804184914 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:43.917119026 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:44.019752979 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:44.019999027 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:44.136116982 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:44.237888098 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:44.238063097 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:44.355176926 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:44.457658052 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:44.457751036 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:44.573474884 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:44.675307989 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:44.675410986 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:44.792594910 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:44.894566059 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:44.894752026 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:45.010694981 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:45.112613916 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:45.112782955 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:45.231662989 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:45.333462954 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:45.334356070 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:45.448331118 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:45.550421000 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:45.550674915 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:45.667653084 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:45.769488096 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:45.775439978 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:45.901645899 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:46.003710985 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:46.003987074 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:46.121721983 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:46.223608017 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:46.223870039 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:46.343348026 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:46.445341110 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:46.445605040 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:46.562244892 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:46.664100885 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:46.664356947 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:46.777786970 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:46.879820108 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:46.880073071 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:46.996202946 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:47.097904921 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:47.098193884 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:47.213947058 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:47.316598892 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:47.316689968 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:47.432728052 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:47.534759998 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:47.534903049 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:47.652726889 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:47.754878044 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:47.755163908 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:47.871330023 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:47.974225044 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:47.976516008 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:48.089934111 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:48.191838026 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:48.192085028 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:48.308959007 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:48.410903931 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:48.412183046 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:48.526997089 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:48.628794909 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:48.629060030 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:48.747057915 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:48.848983049 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:48.849348068 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:48.965898037 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:49.067764997 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:49.068012953 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:49.183600903 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:49.285334110 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:49.285644054 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:49.405066967 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:49.506928921 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:49.507246971 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:49.622292995 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:49.724159956 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:49.724277973 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:49.839947939 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:49.942543983 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:49.942651987 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:50.058027983 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:50.161024094 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:50.161155939 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:50.276936054 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:50.378814936 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:50.378945112 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:50.497163057 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:50.598936081 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:50.599173069 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:50.715555906 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:50.817886114 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:50.817989111 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:50.934988976 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:51.036796093 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:51.037108898 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:51.152565956 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:51.254511118 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:51.254709959 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:51.371556997 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:51.473953962 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:51.474273920 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:51.591568947 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:51.694498062 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:51.694860935 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:51.808969021 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:51.911017895 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:51.914128065 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:52.028608084 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:52.132086039 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:52.132385015 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:52.247627020 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:52.352166891 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:52.352487087 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:52.465596914 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:52.567974091 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:52.568171978 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:52.683801889 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:52.787075043 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:52.787280083 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:52.902730942 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:53.004760981 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:53.004882097 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:53.120847940 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:53.226104021 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:53.227148056 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:53.340507984 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:53.442223072 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:53.444775105 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:53.558733940 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:53.665060997 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:53.665309906 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:53.778129101 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:53.879811049 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:53.879961014 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:53.996994972 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:54.098743916 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:54.098921061 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:54.216790915 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:54.319677114 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:54.319977045 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:54.434587955 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:54.537319899 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:54.537626028 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:54.653520107 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:54.755525112 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:54.755620003 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:54.871895075 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:54.975459099 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:54.975637913 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:55.090590000 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:35:55.192838907 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:35:55.193006992 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:36:00.197355986 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:36:00.197374105 CEST44349745164.90.131.131192.168.2.3
            Aug 2, 2021 13:36:00.197469950 CEST49745443192.168.2.3164.90.131.131
            Aug 2, 2021 13:36:00.197503090 CEST49745443192.168.2.3164.90.131.131

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Aug 2, 2021 13:33:42.970093012 CEST5598453192.168.2.38.8.8.8
            Aug 2, 2021 13:33:42.996419907 CEST53559848.8.8.8192.168.2.3
            Aug 2, 2021 13:33:43.986186028 CEST6418553192.168.2.38.8.8.8
            Aug 2, 2021 13:33:44.011964083 CEST53641858.8.8.8192.168.2.3
            Aug 2, 2021 13:33:45.039146900 CEST6511053192.168.2.38.8.8.8
            Aug 2, 2021 13:33:45.063771009 CEST53651108.8.8.8192.168.2.3
            Aug 2, 2021 13:33:45.905956984 CEST5836153192.168.2.38.8.8.8
            Aug 2, 2021 13:33:45.930618048 CEST53583618.8.8.8192.168.2.3
            Aug 2, 2021 13:33:46.615179062 CEST6349253192.168.2.38.8.8.8
            Aug 2, 2021 13:33:46.641977072 CEST53634928.8.8.8192.168.2.3
            Aug 2, 2021 13:33:47.270052910 CEST6083153192.168.2.38.8.8.8
            Aug 2, 2021 13:33:47.304307938 CEST53608318.8.8.8192.168.2.3
            Aug 2, 2021 13:33:48.053533077 CEST6010053192.168.2.38.8.8.8
            Aug 2, 2021 13:33:48.080106974 CEST53601008.8.8.8192.168.2.3
            Aug 2, 2021 13:33:49.064507008 CEST5319553192.168.2.38.8.8.8
            Aug 2, 2021 13:33:49.089667082 CEST53531958.8.8.8192.168.2.3
            Aug 2, 2021 13:33:49.713998079 CEST5014153192.168.2.38.8.8.8
            Aug 2, 2021 13:33:49.744657993 CEST53501418.8.8.8192.168.2.3
            Aug 2, 2021 13:33:51.830730915 CEST5302353192.168.2.38.8.8.8
            Aug 2, 2021 13:33:51.858619928 CEST53530238.8.8.8192.168.2.3
            Aug 2, 2021 13:33:52.636219025 CEST4956353192.168.2.38.8.8.8
            Aug 2, 2021 13:33:52.665013075 CEST53495638.8.8.8192.168.2.3
            Aug 2, 2021 13:33:56.232443094 CEST5135253192.168.2.38.8.8.8
            Aug 2, 2021 13:33:56.268361092 CEST53513528.8.8.8192.168.2.3
            Aug 2, 2021 13:33:57.629832029 CEST5934953192.168.2.38.8.8.8
            Aug 2, 2021 13:33:57.656357050 CEST53593498.8.8.8192.168.2.3
            Aug 2, 2021 13:33:59.382101059 CEST5708453192.168.2.38.8.8.8
            Aug 2, 2021 13:33:59.407244921 CEST53570848.8.8.8192.168.2.3
            Aug 2, 2021 13:34:00.104933023 CEST5882353192.168.2.38.8.8.8
            Aug 2, 2021 13:34:00.132669926 CEST53588238.8.8.8192.168.2.3
            Aug 2, 2021 13:34:00.806318045 CEST5756853192.168.2.38.8.8.8
            Aug 2, 2021 13:34:00.834259033 CEST53575688.8.8.8192.168.2.3
            Aug 2, 2021 13:34:01.948477983 CEST5054053192.168.2.38.8.8.8
            Aug 2, 2021 13:34:01.984610081 CEST53505408.8.8.8192.168.2.3
            Aug 2, 2021 13:34:15.751302004 CEST5436653192.168.2.38.8.8.8
            Aug 2, 2021 13:34:15.784214020 CEST53543668.8.8.8192.168.2.3
            Aug 2, 2021 13:34:21.827714920 CEST5303453192.168.2.38.8.8.8
            Aug 2, 2021 13:34:21.863329887 CEST53530348.8.8.8192.168.2.3
            Aug 2, 2021 13:34:46.912652016 CEST5776253192.168.2.38.8.8.8
            Aug 2, 2021 13:34:46.973166943 CEST53577628.8.8.8192.168.2.3
            Aug 2, 2021 13:34:47.549884081 CEST5543553192.168.2.38.8.8.8
            Aug 2, 2021 13:34:47.630480051 CEST53554358.8.8.8192.168.2.3
            Aug 2, 2021 13:34:48.131292105 CEST5071353192.168.2.38.8.8.8
            Aug 2, 2021 13:34:48.166340113 CEST53507138.8.8.8192.168.2.3
            Aug 2, 2021 13:34:48.607642889 CEST5613253192.168.2.38.8.8.8
            Aug 2, 2021 13:34:48.643054008 CEST53561328.8.8.8192.168.2.3
            Aug 2, 2021 13:34:49.193661928 CEST5898753192.168.2.38.8.8.8
            Aug 2, 2021 13:34:49.225845098 CEST53589878.8.8.8192.168.2.3
            Aug 2, 2021 13:34:49.335520983 CEST5657953192.168.2.38.8.8.8
            Aug 2, 2021 13:34:49.383615971 CEST53565798.8.8.8192.168.2.3
            Aug 2, 2021 13:34:49.768141985 CEST6063353192.168.2.38.8.8.8
            Aug 2, 2021 13:34:49.800760984 CEST53606338.8.8.8192.168.2.3
            Aug 2, 2021 13:34:50.440877914 CEST6129253192.168.2.38.8.8.8
            Aug 2, 2021 13:34:50.465858936 CEST53612928.8.8.8192.168.2.3
            Aug 2, 2021 13:34:51.274610043 CEST6361953192.168.2.38.8.8.8
            Aug 2, 2021 13:34:51.310234070 CEST53636198.8.8.8192.168.2.3
            Aug 2, 2021 13:34:52.377286911 CEST6493853192.168.2.38.8.8.8
            Aug 2, 2021 13:34:52.411283970 CEST53649388.8.8.8192.168.2.3
            Aug 2, 2021 13:34:52.781558037 CEST6194653192.168.2.38.8.8.8
            Aug 2, 2021 13:34:52.806242943 CEST53619468.8.8.8192.168.2.3
            Aug 2, 2021 13:34:58.255539894 CEST6491053192.168.2.38.8.8.8
            Aug 2, 2021 13:34:58.290641069 CEST53649108.8.8.8192.168.2.3
            Aug 2, 2021 13:35:28.107701063 CEST5212353192.168.2.38.8.8.8
            Aug 2, 2021 13:35:28.140614033 CEST53521238.8.8.8192.168.2.3
            Aug 2, 2021 13:35:31.468569040 CEST5613053192.168.2.38.8.8.8
            Aug 2, 2021 13:35:31.504657984 CEST53561308.8.8.8192.168.2.3
            Aug 2, 2021 13:35:40.641864061 CEST5633853192.168.2.38.8.8.8
            Aug 2, 2021 13:35:40.756855011 CEST53563388.8.8.8192.168.2.3

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Aug 2, 2021 13:35:40.641864061 CEST192.168.2.38.8.8.80x4556Standard query (0)spuredge.comA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Aug 2, 2021 13:35:40.756855011 CEST8.8.8.8192.168.2.30x4556No error (0)spuredge.com164.90.131.131A (IP address)IN (0x0001)

            HTTPS Packets

            TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
            Aug 2, 2021 13:35:41.030519962 CEST164.90.131.131443192.168.2.349745CN=spuredge.com CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Tue Jun 22 04:59:46 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Mon Sep 20 04:59:45 CEST 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
            CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
            CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024

            Code Manipulations

            Statistics

            CPU Usage

            Click to jump to process

            Memory Usage

            Click to jump to process

            High Level Behavior Distribution

            Click to dive into process behavior distribution

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:13:33:49
            Start date:02/08/2021
            Path:C:\Users\user\Desktop\Invoice-NBM01557.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\Invoice-NBM01557.exe'
            Imagebase:0x400000
            File size:406648 bytes
            MD5 hash:32C099A7B9A5CFE1920C5E27D4C26F87
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Visual Basic
            Yara matches:
            • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000000.00000000.197691242.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
            Reputation:low

            General

            Start time:13:35:01
            Start date:02/08/2021
            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Wow64 process (32bit):false
            Commandline:'C:\Users\user\Desktop\Invoice-NBM01557.exe'
            Imagebase:0x320000
            File size:64616 bytes
            MD5 hash:6FD7592411112729BF6B1F2F6C34899F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:13:35:01
            Start date:02/08/2021
            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Wow64 process (32bit):false
            Commandline:'C:\Users\user\Desktop\Invoice-NBM01557.exe'
            Imagebase:0x390000
            File size:64616 bytes
            MD5 hash:6FD7592411112729BF6B1F2F6C34899F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:13:35:02
            Start date:02/08/2021
            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Wow64 process (32bit):false
            Commandline:'C:\Users\user\Desktop\Invoice-NBM01557.exe'
            Imagebase:0x220000
            File size:64616 bytes
            MD5 hash:6FD7592411112729BF6B1F2F6C34899F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:13:35:02
            Start date:02/08/2021
            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Wow64 process (32bit):false
            Commandline:'C:\Users\user\Desktop\Invoice-NBM01557.exe'
            Imagebase:0x3f0000
            File size:64616 bytes
            MD5 hash:6FD7592411112729BF6B1F2F6C34899F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:13:35:02
            Start date:02/08/2021
            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\Invoice-NBM01557.exe'
            Imagebase:0xa90000
            File size:64616 bytes
            MD5 hash:6FD7592411112729BF6B1F2F6C34899F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:13:35:03
            Start date:02/08/2021
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6b2800000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Disassembly

            Code Analysis

            Reset < >

              Execution Graph

              Execution Coverage:2.1%
              Dynamic/Decrypted Code Coverage:0.4%
              Signature Coverage:0%
              Total number of Nodes:569
              Total number of Limit Nodes:3

              Graph

              execution_graph 1367 429880 1368 4298ba 8 API calls 1367->1368 1369 429a21 1368->1369 1370 429978 1368->1370 1371 429a2a __vbaNew2 1369->1371 1372 429a3f __vbaObjSet 1369->1372 1373 429990 1370->1373 1374 429980 __vbaNew2 1370->1374 1371->1372 1378 429a60 1372->1378 1376 4299a6 __vbaHresultCheckObj 1373->1376 1377 4299b5 1373->1377 1374->1373 1376->1377 1383 4299f4 __vbaHresultCheckObj 1377->1383 1384 429a09 __vbaStrMove __vbaFreeObj 1377->1384 1379 429a66 __vbaHresultCheckObj 1378->1379 1380 429a78 __vbaFreeObj 1378->1380 1379->1380 1381 429a8a __vbaNew2 1380->1381 1382 429a9f __vbaObjSet 1380->1382 1381->1382 1386 429abe 1382->1386 1383->1384 1384->1369 1387 429ad6 __vbaFreeObj 1386->1387 1388 429ac4 __vbaHresultCheckObj 1386->1388 1389 429b16 __vbaFreeStr __vbaFreeStr __vbaFreeStr 1387->1389 1388->1387 1158 42aa40 __vbaStrCopy 1159 42aaa8 __vbaObjSet 1158->1159 1160 42aa8f __vbaNew2 1158->1160 1162 42aad3 1159->1162 1160->1159 1163 42aaeb 7 API calls 1162->1163 1164 42aad9 __vbaHresultCheckObj 1162->1164 1165 42ab56 __vbaNew2 1163->1165 1166 42ab67 __vbaObjSet 1163->1166 1164->1163 1165->1166 1168 42ab82 1166->1168 1169 42ab9a __vbaFreeObj 1168->1169 1170 42ab88 __vbaHresultCheckObj 1168->1170 1171 42abac __vbaNew2 1169->1171 1172 42abbd __vbaObjSet 1169->1172 1170->1169 1171->1172 1174 42abfd 1172->1174 1175 42ac03 __vbaHresultCheckObj 1174->1175 1176 42ac15 __vbaFreeObj 1174->1176 1175->1176 1177 42ac5a __vbaFreeStr 1176->1177 1180 429e40 7 API calls 1181 429f1c 1180->1181 1182 429fbd 1180->1182 1185 429f34 1181->1185 1186 429f24 __vbaNew2 1181->1186 1183 429fc6 __vbaNew2 1182->1183 1184 429fdb __vbaObjSet 1182->1184 1183->1184 1190 429ffc 1184->1190 1188 429f4a __vbaHresultCheckObj 1185->1188 1189 429f59 1185->1189 1186->1185 1188->1189 1195 429f96 __vbaHresultCheckObj 1189->1195 1196 429fa5 __vbaStrMove __vbaFreeObj 1189->1196 1191 42a002 __vbaHresultCheckObj 1190->1191 1192 42a014 __vbaFreeObj 1190->1192 1191->1192 1193 42a026 __vbaNew2 1192->1193 1194 42a03b __vbaObjSet 1192->1194 1193->1194 1198 42a05a 1194->1198 1195->1196 1196->1182 1199 42a072 __vbaFreeObj 1198->1199 1200 42a060 __vbaHresultCheckObj 1198->1200 1201 42a0b2 __vbaFreeStr __vbaFreeStr 1199->1201 1200->1199 1202 424a40 __vbaStrCopy __vbaStrCopy 1203 424a9e __vbaNew2 1202->1203 1204 424aae 1202->1204 1203->1204 1205 424ad3 1204->1205 1206 424ac4 __vbaHresultCheckObj 1204->1206 1207 424af7 __vbaFreeObj __vbaI4Str #608 __vbaVarTstNe __vbaFreeVar 1205->1207 1208 424ae8 __vbaHresultCheckObj 1205->1208 1206->1205 1209 424b42 #531 1207->1209 1210 424b4d __vbaFreeStr __vbaFreeStr 1207->1210 1208->1207 1209->1210 1269 42c0c0 1270 42c0f7 6 API calls 1269->1270 1271 42c24b 1270->1271 1272 42c16f 1270->1272 1275 42c25a __vbaNew2 1271->1275 1276 42c26f __vbaObjSet 1271->1276 1273 42c178 __vbaNew2 1272->1273 1274 42c18d __vbaObjSet 1272->1274 1273->1274 1279 42c1b2 1274->1279 1275->1276 1280 42c28e 1276->1280 1281 42c1ca 1279->1281 1282 42c1b8 __vbaHresultCheckObj 1279->1282 1283 42c2a6 __vbaFreeObj 1280->1283 1284 42c294 __vbaHresultCheckObj 1280->1284 1285 42c1e2 1281->1285 1286 42c1d2 __vbaNew2 1281->1286 1282->1281 1287 42c2e2 __vbaFreeObj 1283->1287 1284->1283 1288 42c233 __vbaObjSet __vbaFreeObj 1285->1288 1289 42c224 __vbaHresultCheckObj 1285->1289 1286->1285 1288->1271 1289->1288 1726 42af80 1727 42afb7 #517 __vbaStrMove __vbaStrCmp __vbaFreeStr 1726->1727 1728 42b010 1727->1728 1729 42b125 __vbaAryDestruct 1727->1729 1731 42b019 __vbaNew2 1728->1731 1732 42b02e __vbaObjSet 1728->1732 1731->1732 1734 42b051 1732->1734 1735 42b057 __vbaHresultCheckObj 1734->1735 1736 42b069 1734->1736 1735->1736 1737 42b081 1736->1737 1738 42b071 __vbaNew2 1736->1738 1739 42b0de __vbaHresultCheckObj 1737->1739 1740 42b0ed __vbaVar2Vec __vbaAryMove __vbaFreeObj __vbaFreeVarList 1737->1740 1738->1737 1739->1740 1740->1729 1390 424c80 1391 424cb7 __vbaStrCopy __vbaStrCopy 1390->1391 1392 424cf4 1391->1392 1393 424ce4 __vbaNew2 1391->1393 1394 424d0a __vbaHresultCheckObj 1392->1394 1395 424d19 1392->1395 1393->1392 1394->1395 1396 424d43 __vbaStrMove __vbaFreeObj 1395->1396 1397 424d31 __vbaHresultCheckObj 1395->1397 1398 424d64 __vbaNew2 1396->1398 1399 424d79 __vbaObjSet 1396->1399 1397->1396 1398->1399 1401 424dbd 1399->1401 1402 424dc3 __vbaHresultCheckObj 1401->1402 1403 424dd5 __vbaFreeObj 1401->1403 1402->1403 1404 424df8 __vbaFreeStr __vbaFreeStr __vbaFreeStr 1403->1404 1405 423080 1406 4230b7 1405->1406 1407 4230c3 __vbaNew2 1406->1407 1408 4230d8 __vbaObjSet 1406->1408 1407->1408 1410 4230f7 1408->1410 1411 42310f __vbaFreeObj 1410->1411 1412 4230fd __vbaHresultCheckObj 1410->1412 1413 423129 1411->1413 1412->1411 1615 4237c0 1616 4237fa __vbaAryConstruct2 #517 __vbaStrMove __vbaStrCmp __vbaFreeStr 1615->1616 1617 423873 #685 __vbaObjSet 1616->1617 1618 423960 #682 __vbaFpR8 1616->1618 1620 4238b3 __vbaNew2 1617->1620 1621 4238c8 __vbaObjSet 1617->1621 1619 4239ba __vbaFreeVar 1618->1619 1623 4239d7 1619->1623 1624 423a6a 1619->1624 1620->1621 1630 4238ea 1621->1630 1628 4239ef 1623->1628 1629 4239df __vbaNew2 1623->1629 1626 423a73 __vbaNew2 1624->1626 1627 423a88 __vbaObjSet 1624->1627 1626->1627 1636 423aae 1627->1636 1634 423a14 1628->1634 1635 423a05 __vbaHresultCheckObj 1628->1635 1629->1628 1631 423902 1630->1631 1632 4238f0 __vbaHresultCheckObj 1630->1632 1637 423926 __vbaHresultCheckObj 1631->1637 1638 423935 __vbaFreeObjList __vbaFreeVarList 1631->1638 1632->1631 1641 423a52 __vbaHresultCheckObj 1634->1641 1642 423a61 __vbaFreeObj 1634->1642 1635->1634 1639 423ac6 __vbaFreeObj 1636->1639 1640 423ab4 __vbaHresultCheckObj 1636->1640 1637->1638 1638->1618 1643 423b15 __vbaAryDestruct 1639->1643 1640->1639 1641->1642 1642->1624 1178 401944 #100 1179 401984 1178->1179 1654 4247d0 1655 424822 __vbaObjSet 1654->1655 1656 42480d __vbaNew2 1654->1656 1658 424847 1655->1658 1656->1655 1659 42485f 1658->1659 1660 42484d __vbaHresultCheckObj 1658->1660 1661 424868 __vbaNew2 1659->1661 1662 42487d __vbaObjSet 1659->1662 1660->1659 1661->1662 1664 424906 1662->1664 1665 42491e __vbaFreeObjList 1664->1665 1666 42490c __vbaHresultCheckObj 1664->1666 1667 42493a __vbaNew2 1665->1667 1668 42494f __vbaObjSet 1665->1668 1666->1665 1667->1668 1670 42498b 1668->1670 1671 4249a3 __vbaFreeObj 1670->1671 1672 424991 __vbaHresultCheckObj 1670->1672 1673 4249b7 __vbaNew2 1671->1673 1674 4249cc __vbaObjSet 1671->1674 1672->1671 1673->1674 1676 4249eb 1674->1676 1677 424a03 __vbaFreeObj 1676->1677 1678 4249f1 __vbaHresultCheckObj 1676->1678 1679 424a24 1677->1679 1678->1677 1212 42b850 __vbaStrCopy 1213 42b8b1 __vbaObjSet 1212->1213 1214 42b89c __vbaNew2 1212->1214 1216 42b8d7 __vbaNew2 1213->1216 1217 42b8ec __vbaObjSet 1213->1217 1214->1213 1216->1217 1219 42b90b 1217->1219 1220 42b923 1219->1220 1221 42b911 __vbaHresultCheckObj 1219->1221 1222 42b963 __vbaFreeStr __vbaFreeObjList 1220->1222 1223 42b951 __vbaHresultCheckObj 1220->1223 1221->1220 1224 42b9b2 __vbaFreeStr 1222->1224 1223->1222 1298 42b4d0 1299 42b507 __vbaStrCopy #610 #552 __vbaVarMove __vbaFreeVar 1298->1299 1300 42b560 __vbaNew2 1299->1300 1301 42b575 __vbaObjSet 1299->1301 1300->1301 1303 42b595 1301->1303 1304 42b5aa __vbaFreeObj 1303->1304 1305 42b59b __vbaHresultCheckObj 1303->1305 1306 42b5de __vbaFreeVar __vbaFreeStr 1304->1306 1305->1304 1414 42ac90 1415 42acc7 __vbaStrCopy 1414->1415 1416 42acfa __vbaNew2 1415->1416 1417 42ad0f __vbaObjSet 1415->1417 1416->1417 1419 42ad30 1417->1419 1420 42ad36 __vbaHresultCheckObj 1419->1420 1421 42ad48 __vbaFreeObj __vbaStrCopy #524 __vbaVarTstNe __vbaFreeVar 1419->1421 1420->1421 1422 42ae51 #709 1421->1422 1423 42adab 1421->1423 1424 42af12 __vbaFreeStr __vbaFreeObj __vbaFreeStr 1422->1424 1425 42ae6d 1422->1425 1426 42adb4 __vbaNew2 1423->1426 1427 42adc9 __vbaObjSet 1423->1427 1428 42ae85 1425->1428 1429 42ae75 __vbaNew2 1425->1429 1426->1427 1433 42ade8 1427->1433 1432 42ae9b __vbaHresultCheckObj 1428->1432 1436 42aeaa 1428->1436 1429->1428 1432->1436 1434 42ae00 7 API calls 1433->1434 1435 42adee __vbaHresultCheckObj 1433->1435 1434->1422 1435->1434 1437 42aef4 __vbaObjSet __vbaFreeObj 1436->1437 1438 42aee5 __vbaHresultCheckObj 1436->1438 1437->1424 1438->1437 1439 422e90 __vbaVarDup #522 __vbaVarTstNe __vbaFreeVarList 1440 422f62 1439->1440 1441 422f2e __vbaVarDup #667 __vbaStrMove __vbaFreeVar 1439->1441 1442 422f80 __vbaObjSet 1440->1442 1443 422f6b __vbaNew2 1440->1443 1441->1440 1445 422fa1 1442->1445 1443->1442 1446 422fa7 __vbaHresultCheckObj 1445->1446 1447 422fb9 __vbaFreeObj 1445->1447 1446->1447 1448 422fe0 __vbaObjSet 1447->1448 1449 422fcb __vbaNew2 1447->1449 1451 422ffb 1448->1451 1449->1448 1452 423013 __vbaFreeObj 1451->1452 1453 423001 __vbaHresultCheckObj 1451->1453 1454 423052 __vbaFreeStr 1452->1454 1453->1452 1480 423150 7 API calls 1481 4231f9 1480->1481 1482 42330e __vbaAryDestruct __vbaFreeStr 1480->1482 1484 423202 __vbaNew2 1481->1484 1485 423217 __vbaObjSet 1481->1485 1484->1485 1487 42323a 1485->1487 1488 423252 1487->1488 1489 423240 __vbaHresultCheckObj 1487->1489 1490 42326a 1488->1490 1491 42325a __vbaNew2 1488->1491 1489->1488 1492 4232d6 __vbaVar2Vec __vbaAryMove __vbaFreeObj __vbaFreeVarList 1490->1492 1493 4232c7 __vbaHresultCheckObj 1490->1493 1491->1490 1492->1482 1493->1492 1558 424310 #521 __vbaStrMove __vbaStrCmp __vbaFreeStr 1559 4243a0 1558->1559 1560 424466 7 API calls 1558->1560 1561 4243a9 __vbaNew2 1559->1561 1562 4243be __vbaObjSet 1559->1562 1563 424570 __vbaFreeObj __vbaFreeObj 1560->1563 1564 4244cb 1560->1564 1561->1562 1571 4243e1 1562->1571 1565 4244e3 1564->1565 1566 4244d3 __vbaNew2 1564->1566 1569 424508 1565->1569 1570 4244f9 __vbaHresultCheckObj 1565->1570 1566->1565 1574 424541 __vbaHresultCheckObj 1569->1574 1575 424556 __vbaObjSet __vbaFreeObj 1569->1575 1570->1569 1572 4243e7 __vbaHresultCheckObj 1571->1572 1573 4243f9 __vbaLateMemCall __vbaFreeObj __vbaFreeVar 1571->1573 1572->1573 1573->1560 1574->1575 1575->1563 1644 42bbd0 __vbaStrCopy 1645 42bc16 __vbaNew2 1644->1645 1646 42bc2b __vbaObjSet 1644->1646 1645->1646 1648 42bc6a 1646->1648 1649 42bc82 __vbaFreeObj #586 __vbaFpR8 1648->1649 1650 42bc70 __vbaHresultCheckObj 1648->1650 1651 42bca6 #569 1649->1651 1652 42bcae __vbaFreeStr 1649->1652 1650->1649 1651->1652 1741 423390 1742 4233c7 __vbaInStr 1741->1742 1743 423489 1742->1743 1744 4233fe 1742->1744 1745 42348f #598 #670 __vbaVarTstEq __vbaFreeVar 1743->1745 1746 423406 __vbaNew2 1744->1746 1753 423416 1744->1753 1747 423530 1745->1747 1748 4234cc 1745->1748 1746->1753 1749 423539 __vbaNew2 1747->1749 1750 42354e __vbaObjSet 1747->1750 1751 4234e4 1748->1751 1752 4234d4 __vbaNew2 1748->1752 1749->1750 1759 42356e 1750->1759 1757 423505 1751->1757 1758 4234fa __vbaHresultCheckObj 1751->1758 1752->1751 1754 42343f 1753->1754 1755 42342c __vbaHresultCheckObj 1753->1755 1760 423464 __vbaHresultCheckObj 1754->1760 1761 42346f __vbaStrMove __vbaFreeObj 1754->1761 1755->1754 1765 423527 __vbaFreeObj 1757->1765 1766 42351c __vbaHresultCheckObj 1757->1766 1758->1757 1762 423574 __vbaHresultCheckObj 1759->1762 1763 42357f __vbaFreeObj 1759->1763 1760->1761 1761->1745 1762->1763 1764 4235bc __vbaFreeStr 1763->1764 1765->1747 1766->1765 1325 42b6e0 #704 __vbaStrMove __vbaFreeVar 1326 42b74f __vbaFreeStr 1325->1326 1234 42a620 1235 42a65a __vbaVarDup #528 __vbaVarTstNe __vbaFreeVarList 1234->1235 1236 42a7fe 1235->1236 1237 42a6de 1235->1237 1238 42a6e7 __vbaNew2 1237->1238 1239 42a6fc __vbaObjSet 1237->1239 1238->1239 1241 42a721 1239->1241 1242 42a727 __vbaHresultCheckObj 1241->1242 1243 42a739 1241->1243 1242->1243 1244 42a742 __vbaNew2 1243->1244 1245 42a757 __vbaObjSet 1243->1245 1244->1245 1247 42a776 1245->1247 1248 42a78e __vbaFpI4 1247->1248 1249 42a77c __vbaHresultCheckObj 1247->1249 1250 42a7d3 1248->1250 1249->1248 1251 42a7eb __vbaFreeObjList 1250->1251 1252 42a7d9 __vbaHresultCheckObj 1250->1252 1251->1236 1252->1251 1307 42bce0 1308 42bd17 1307->1308 1309 42bd38 __vbaNew2 1308->1309 1310 42bd4d __vbaObjSet 1308->1310 1309->1310 1312 42bd91 1310->1312 1313 42bd97 __vbaHresultCheckObj 1312->1313 1314 42bdad 1312->1314 1315 42bdb3 __vbaFreeObj 1313->1315 1314->1315 1316 42bdd4 1315->1316 1317 42bdc4 __vbaNew2 1315->1317 1318 42bdf5 1316->1318 1319 42bdea __vbaHresultCheckObj 1316->1319 1317->1316 1320 42be1b __vbaI2I4 __vbaFreeObj #714 __vbaVarTstNe __vbaFreeVarList 1318->1320 1321 42be0d __vbaHresultCheckObj 1318->1321 1319->1318 1322 42bead 1320->1322 1323 42be88 1320->1323 1321->1320 1323->1322 1324 42be9f __vbaHresultCheckObj 1323->1324 1324->1322 1694 42b9e0 1695 42ba17 #616 __vbaStrMove __vbaStrCmp __vbaFreeStr 1694->1695 1696 42bb14 __vbaStrCopy #618 __vbaStrMove __vbaStrCmp __vbaFreeStr 1695->1696 1697 42ba69 1695->1697 1698 42bb6e __vbaFreeStr 1696->1698 1699 42bb5d __vbaFileOpen 1696->1699 1700 42ba72 __vbaNew2 1697->1700 1701 42ba87 __vbaObjSet 1697->1701 1699->1698 1700->1701 1704 42baaa 1701->1704 1705 42bac2 __vbaFpI4 1704->1705 1706 42bab0 __vbaHresultCheckObj 1704->1706 1707 42baf3 1705->1707 1706->1705 1708 42bb0b __vbaFreeObj 1707->1708 1709 42baf9 __vbaHresultCheckObj 1707->1709 1708->1696 1709->1708 1455 423ea0 1456 423eda 1455->1456 1457 423f13 __vbaNew2 1456->1457 1458 423f28 __vbaObjSet 1456->1458 1457->1458 1460 423f57 __vbaNew2 1458->1460 1461 423f6c __vbaObjSet 1458->1461 1460->1461 1463 423f8b 1461->1463 1464 423fa3 __vbaLateIdCallLd __vbaStrVarMove __vbaStrMove 1463->1464 1465 423f91 __vbaHresultCheckObj 1463->1465 1466 423fee 1464->1466 1465->1464 1467 424006 12 API calls 1466->1467 1468 423ff4 __vbaHresultCheckObj 1466->1468 1469 424130 __vbaFpI4 1467->1469 1470 42415f 1467->1470 1468->1467 1473 424146 1469->1473 1471 42417e 1470->1471 1472 42416e __vbaNew2 1470->1472 1475 424194 __vbaHresultCheckObj 1471->1475 1476 42419f 1471->1476 1472->1471 1473->1470 1474 42414c __vbaHresultCheckObj 1473->1474 1474->1470 1475->1476 1477 4241c2 __vbaFreeObj 1476->1477 1478 4241b7 __vbaHresultCheckObj 1476->1478 1479 424210 1477->1479 1478->1477 1502 429b60 1503 429b9a 6 API calls 1502->1503 1504 429cc1 #711 __vbaAryVar __vbaAryCopy __vbaFreeVarList 1503->1504 1505 429c1c 1503->1505 1506 429d25 1504->1506 1507 429d49 __vbaGenerateBoundsError 1504->1507 1508 429c34 1505->1508 1509 429c24 __vbaNew2 1505->1509 1506->1507 1510 429d2b 1506->1510 1511 429d52 __vbaStrCmp 1507->1511 1517 429c4a __vbaHresultCheckObj 1508->1517 1518 429c59 1508->1518 1509->1508 1512 429d40 1510->1512 1513 429d37 __vbaGenerateBoundsError 1510->1513 1514 429d68 __vbaLateMemCall 1511->1514 1515 429dbc __vbaFreeObj __vbaFreeObj __vbaFreeStr __vbaFreeStr __vbaAryDestruct 1511->1515 1512->1511 1513->1512 1514->1515 1517->1518 1519 429c92 __vbaHresultCheckObj 1518->1519 1520 429ca7 __vbaObjSet __vbaFreeObj 1518->1520 1519->1520 1520->1504 1680 4245e0 1681 424629 __vbaNew2 1680->1681 1682 42463e __vbaObjSet 1680->1682 1681->1682 1684 424688 1682->1684 1685 4246a0 __vbaFreeObj __vbaStrCopy #619 __vbaVarTstNe __vbaFreeVar 1684->1685 1686 42468e __vbaHresultCheckObj 1684->1686 1687 424703 __vbaVarDup #667 __vbaStrMove __vbaFreeVar 1685->1687 1688 424737 #589 1685->1688 1686->1685 1687->1688 1689 424780 __vbaFreeStr __vbaFreeStr 1688->1689 1690 424746 1688->1690 1690->1689 1691 4247cb 1690->1691 1693 42476e __vbaHresultCheckObj 1690->1693 1691->1691 1693->1689 1800 424ba0 1801 424bd9 __vbaNew2 1800->1801 1802 424bee __vbaObjSet 1800->1802 1801->1802 1804 424c32 1802->1804 1805 424c4a __vbaFreeObj 1804->1805 1806 424c38 __vbaHresultCheckObj 1804->1806 1807 424c64 1805->1807 1806->1805 1796 4297a0 __vbaStrCopy __vbaVarDup #563 __vbaFreeVar 1797 429822 __vbaVarDup #529 __vbaFreeVar 1796->1797 1798 429847 __vbaFreeStr 1796->1798 1797->1798 1521 423b60 __vbaVarDup #547 __vbaVarTstNe __vbaFreeVarList 1522 423c06 1521->1522 1523 423cb8 1521->1523 1524 423c1e 1522->1524 1525 423c0e __vbaNew2 1522->1525 1526 423cc7 __vbaNew2 1523->1526 1527 423cdc __vbaObjSet 1523->1527 1528 423c43 __vbaCastObj __vbaObjSet 1524->1528 1529 423c34 __vbaHresultCheckObj 1524->1529 1525->1524 1526->1527 1531 423d05 __vbaNew2 1527->1531 1532 423d1a __vbaObjSet 1527->1532 1533 423c8c 1528->1533 1529->1528 1531->1532 1537 423d39 1532->1537 1535 423c92 __vbaHresultCheckObj 1533->1535 1536 423ca1 __vbaFreeObjList 1533->1536 1535->1536 1536->1523 1538 423d51 1537->1538 1539 423d3f __vbaHresultCheckObj 1537->1539 1540 423d92 __vbaFreeStr __vbaFreeObjList 1538->1540 1541 423d80 __vbaHresultCheckObj 1538->1541 1539->1538 1542 423db7 __vbaNew2 1540->1542 1543 423dcc __vbaObjSet 1540->1543 1541->1540 1542->1543 1545 423e12 1543->1545 1546 423e2a __vbaFreeObj 1545->1546 1547 423e18 __vbaHresultCheckObj 1545->1547 1548 423e72 __vbaFreeObj 1546->1548 1547->1546 1591 42c320 1592 42c357 __vbaStrCopy #648 __vbaFreeVar 1591->1592 1593 42c3b4 1592->1593 1594 42c3a4 __vbaNew2 1592->1594 1595 42c3ca __vbaHresultCheckObj 1593->1595 1596 42c3dd 1593->1596 1594->1593 1595->1596 1597 42c403 __vbaFreeObj #585 __vbaFpR8 1596->1597 1598 42c3f8 __vbaHresultCheckObj 1596->1598 1599 42c42b 1597->1599 1600 42c4ce 1597->1600 1598->1597 1603 42c443 1599->1603 1604 42c433 __vbaNew2 1599->1604 1601 42c4d7 __vbaNew2 1600->1601 1602 42c4ec __vbaObjSet 1600->1602 1601->1602 1607 42c50f 1602->1607 1606 42c459 __vbaHresultCheckObj 1603->1606 1610 42c464 1603->1610 1604->1603 1606->1610 1608 42c523 __vbaFreeObj 1607->1608 1609 42c515 __vbaHresultCheckObj 1607->1609 1611 42c557 __vbaFreeObj __vbaFreeStr 1608->1611 1609->1608 1612 42c49b __vbaHresultCheckObj 1610->1612 1613 42c4ae 1610->1613 1614 42c4b4 __vbaObjSet __vbaFreeObj 1612->1614 1613->1614 1614->1600 1767 42c5a0 1768 42c5d7 #582 __vbaFpR8 1767->1768 1769 42c602 1768->1769 1770 42c6f7 1768->1770 1771 42c620 __vbaObjSet 1769->1771 1772 42c60b __vbaNew2 1769->1772 1773 42c706 __vbaNew2 1770->1773 1774 42c71b __vbaObjSet 1770->1774 1777 42c645 1771->1777 1772->1771 1773->1774 1778 42c736 __vbaNew2 1774->1778 1779 42c74b __vbaObjSet 1774->1779 1780 42c64b __vbaHresultCheckObj 1777->1780 1781 42c65d 1777->1781 1778->1779 1787 42c76a 1779->1787 1780->1781 1782 42c676 _adj_fdiv_m64 1781->1782 1783 42c66e 1781->1783 1782->1783 1785 42c697 __vbaFpI4 1783->1785 1786 42c828 1783->1786 1790 42c6d2 1785->1790 1786->1786 1788 42c782 1787->1788 1789 42c770 __vbaHresultCheckObj 1787->1789 1793 42c7c7 __vbaFreeStr __vbaFreeObjList 1788->1793 1794 42c7b5 __vbaHresultCheckObj 1788->1794 1789->1788 1791 42c6ea __vbaFreeObj 1790->1791 1792 42c6d8 __vbaHresultCheckObj 1790->1792 1791->1770 1792->1791 1795 42c808 1793->1795 1794->1793 1225 42a870 1226 42a8a7 __vbaStrCopy 1225->1226 1227 42a8c4 __vbaNew2 1226->1227 1228 42a8d4 1226->1228 1227->1228 1229 42a8ea __vbaHresultCheckObj 1228->1229 1230 42a8f9 1228->1230 1229->1230 1231 42a90e __vbaHresultCheckObj 1230->1231 1232 42a91d __vbaFreeObj 1230->1232 1231->1232 1233 42a937 __vbaFreeStr 1232->1233 1261 424230 #535 1262 424272 __vbaNew2 1261->1262 1263 424287 __vbaObjSet 1261->1263 1262->1263 1265 4242aa 1263->1265 1266 4242c2 __vbaFreeObj 1265->1266 1267 4242b0 __vbaHresultCheckObj 1265->1267 1268 4242e3 1266->1268 1267->1266 1327 42a0f0 1328 42a127 7 API calls 1327->1328 1329 42a1a3 1328->1329 1330 42a219 #606 __vbaStrMove __vbaStrCmp __vbaFreeStr __vbaFreeVar 1328->1330 1333 42a1bb 1329->1333 1334 42a1ab __vbaNew2 1329->1334 1331 42a28a __vbaFreeStr __vbaFreeObj 1330->1331 1332 42a26b 1330->1332 1332->1331 1338 42a278 __vbaHresultCheckObj 1332->1338 1336 42a1f6 __vbaHresultCheckObj 1333->1336 1337 42a205 __vbaObjSet 1333->1337 1334->1333 1336->1337 1337->1330 1338->1331 1339 42a2f0 1340 42a327 __vbaAryConstruct2 #708 __vbaAryVar __vbaAryCopy __vbaFreeVar 1339->1340 1341 42a3c3 __vbaObjSet 1340->1341 1342 42a3ae __vbaNew2 1340->1342 1344 42a3f2 __vbaNew2 1341->1344 1345 42a407 __vbaObjSet 1341->1345 1342->1341 1344->1345 1347 42a426 1345->1347 1348 42a43e 1347->1348 1349 42a42c __vbaHresultCheckObj 1347->1349 1350 42a47f __vbaFreeStr __vbaFreeObjList __vbaR8Str 1348->1350 1351 42a46d __vbaHresultCheckObj 1348->1351 1349->1348 1352 42a540 1350->1352 1353 42a4b7 1350->1353 1351->1350 1354 42a549 __vbaNew2 1352->1354 1355 42a55e __vbaObjSet 1352->1355 1356 42a4c0 __vbaNew2 1353->1356 1357 42a4d5 __vbaObjSet 1353->1357 1354->1355 1361 42a581 1355->1361 1356->1357 1360 42a4f8 1357->1360 1362 42a510 #600 __vbaFreeObj __vbaFreeVar 1360->1362 1363 42a4fe __vbaHresultCheckObj 1360->1363 1364 42a587 __vbaHresultCheckObj 1361->1364 1365 42a599 __vbaFreeObj 1361->1365 1362->1352 1363->1362 1364->1365 1366 42a5d6 __vbaAryDestruct __vbaAryDestruct 1365->1366 1549 42b770 1550 42b7a7 1549->1550 1551 42b7c5 1550->1551 1552 42b7b5 __vbaNew2 1550->1552 1553 42b7ea 1551->1553 1554 42b7db __vbaHresultCheckObj 1551->1554 1552->1551 1555 42b802 __vbaHresultCheckObj 1553->1555 1556 42b814 __vbaFreeObj 1553->1556 1554->1553 1555->1556 1557 42b82e 1556->1557 1710 4235f0 #526 __vbaVarTstNe __vbaFreeVar 1711 4236f5 1710->1711 1712 42366f 1710->1712 1715 423713 __vbaObjSet 1711->1715 1716 4236fe __vbaNew2 1711->1716 1713 423678 __vbaNew2 1712->1713 1714 42368d __vbaObjSet 1712->1714 1713->1714 1720 4236ad 1714->1720 1719 423736 1715->1719 1716->1715 1721 42374e __vbaFreeObj 1719->1721 1722 42373c __vbaHresultCheckObj 1719->1722 1723 4236c2 #667 __vbaStrMove __vbaFreeObj __vbaFreeVar 1720->1723 1724 4236b3 __vbaHresultCheckObj 1720->1724 1725 42378a __vbaFreeStr 1721->1725 1722->1721 1723->1711 1724->1723 1808 42b1b0 7 API calls 1809 42b274 1808->1809 1810 42b2f5 #660 __vbaVarTstNe __vbaFreeVarList 1808->1810 1816 42b28a __vbaHresultCheckObj 1809->1816 1817 42b29c 1809->1817 1811 42b446 __vbaFreeStr __vbaFreeStr __vbaFreeObj 1810->1811 1812 42b36c 1810->1812 1814 42b375 __vbaNew2 1812->1814 1815 42b38a __vbaObjSet 1812->1815 1814->1815 1821 42b3b0 1815->1821 1816->1817 1818 42b2b4 __vbaObjSet 1817->1818 1819 42b2a4 __vbaNew2 1817->1819 1822 42b2d7 1818->1822 1819->1818 1823 42b3b6 __vbaHresultCheckObj 1821->1823 1824 42b3c8 1821->1824 1825 42b2ec __vbaFreeObj 1822->1825 1826 42b2dd __vbaHresultCheckObj 1822->1826 1823->1824 1827 42b3e0 1824->1827 1828 42b3d0 __vbaNew2 1824->1828 1825->1810 1826->1825 1829 42b42c __vbaObjSet __vbaFreeObj 1827->1829 1830 42b41d __vbaHresultCheckObj 1827->1830 1828->1827 1829->1811 1830->1829

              Executed Functions

              Control-flow Graph

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 0042AA80
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042AA9F
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042AAC2
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409AE8,00000120), ref: 0042AAE5
              • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 0042AAF7
              • __vbaStrVarMove.MSVBVM60(00000000), ref: 0042AB01
              • __vbaStrMove.MSVBVM60 ref: 0042AB0C
              • #690.MSVBVM60(Spisesedler5,Pakkelsninger7,margens,00000000), ref: 0042AB22
              • __vbaFreeStr.MSVBVM60 ref: 0042AB2B
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0042AB3B
              • __vbaFreeVar.MSVBVM60 ref: 0042AB47
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042AB60
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042AB75
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,000001C0), ref: 0042AB94
              • __vbaFreeObj.MSVBVM60 ref: 0042AB9D
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042ABB6
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042ABCB
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 0042AC0F
              • __vbaFreeObj.MSVBVM60 ref: 0042AC18
              • __vbaFreeStr.MSVBVM60(0042AC64), ref: 0042AC5D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresultNew2$Move$#690CallCopyLateList
              • String ID: MILITAERFOLK$Pakkelsninger7$Spisesedler5$margens
              • API String ID: 630048585-2488380470
              • Opcode ID: 594b3762210cce143b99cb181dd82cab812e3d463d4d00264b948fd49a49184f
              • Instruction ID: 1bafe84189e418bbbe903dfc3b9485846cfec61f683c285c1520cf57dc4fa80e
              • Opcode Fuzzy Hash: 594b3762210cce143b99cb181dd82cab812e3d463d4d00264b948fd49a49184f
              • Instruction Fuzzy Hash: B2515071A00214ABCB14DFA4DD49FDA77B8BF0C704F20452AF546B72A1D674A905CBA9
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 21 401944-401981 #100 22 401984-401985 21->22 23 4019e9-4019eb 21->23 24 4019ec-4019f6 22->24 25 401987 22->25 23->24 26 4019f7-401a17 24->26 25->26 27 401989-40199a 25->27 28 401a18-401ae2 26->28 27->28 29 40199c-40199d 27->29 29->23
              C-Code - Quality: 70%
              			_entry_(signed int __eax, signed int __ebx, void* __ecx, void* __edx, signed int __edi, intOrPtr* __esi) {
              				signed char _t25;
              				signed char _t26;
              				signed int _t27;
              				signed int _t28;
              				signed char _t29;
              				intOrPtr* _t30;
              				signed char _t31;
              				signed int _t32;
              				intOrPtr* _t33;
              				signed int _t39;
              				void* _t41;
              				intOrPtr* _t42;
              				void* _t45;
              				intOrPtr* _t46;
              				signed int _t48;
              				intOrPtr* _t56;
              				void* _t62;
              				void* _t63;
              				void* _t66;
              				void* _t68;
              
              				_t56 = __esi;
              				_t48 = __edi;
              				_t32 = __ebx;
              				_push("VB5!6&*"); // executed
              				L0040193C(); // executed
              				 *__eax =  *__eax + __eax;
              				 *__eax =  *__eax + __eax;
              				 *__eax =  *__eax + __eax;
              				 *__eax =  *__eax ^ __eax;
              				 *__eax =  *__eax + __eax;
              				_t25 = __eax + 1;
              				 *_t25 =  *_t25 + _t25;
              				 *_t25 =  *_t25 + _t25;
              				 *_t25 =  *_t25 + _t25;
              				asm("cld");
              				asm("lock aam 0x4a");
              				_push(0x45);
              				_t63 = _t62 + 1;
              				_t39 = 0x000000c7 ^  *(__edi + 0x55e7e214);
              				 *_t25 =  *_t25 + _t25;
              				 *_t25 =  *_t25 + _t25;
              				 *_t25 =  *_t25 + _t25;
              				 *_t25 =  *_t25 + _t25;
              				 *_t25 =  *_t25 + _t25;
              				_t45 = __edx + 1;
              				 *__esi =  *__esi + _t25;
              				_push(_t25);
              				 *_t39 =  *_t39 + 0x62;
              				_t68 =  *_t39;
              				if(_t68 < 0) {
              					L8:
              					 *_t25 =  *_t25 + _t25;
              					 *_t25 =  *_t25 + _t25;
              					goto L9;
              				} else {
              					asm("insb");
              					if(_t68 >= 0) {
              						L9:
              						 *((intOrPtr*)(_t56 - 0x52ffff96)) =  *((intOrPtr*)(_t56 - 0x52ffff96)) + _t32;
              						_push(0x12000000);
              						goto L10;
              					} else {
              						if(_t68 < 0) {
              							L10:
              							 *((intOrPtr*)(_t48 + 0x56)) =  *((intOrPtr*)(_t48 + 0x56)) + _t39;
              							_push(_t45);
              							_push(_t32);
              							_push(_t45);
              							_t41 = _t39 + 1 - 1;
              							_t63 = _t63 + 2;
              							_push(_t45);
              							 *0x53000d01 =  *0x53000d01 + _t41;
              							_push(_t25);
              							_t56 = _t56 - 0xfffffffffffffffe;
              							_t45 = _t45 + 1;
              							_t66 = _t66 + 1 - 1;
              							_t39 = _t41 + 1;
              						} else {
              							 *[gs:eax] =  *[gs:eax] + _t25;
              							asm("les ebp, [ecx]");
              							_push(cs);
              							while(1) {
              								_t31 = _t25 +  *_t25;
              								 *_t31 =  *_t31 + _t31;
              								_t32 = _t32 + _t32;
              								asm("int3");
              								 *_t31 =  *_t31 ^ _t31;
              								_t25 = _t31 | 0x000000c4;
              								if(_t25 >= 0) {
              									goto L11;
              								}
              								asm("pushfd");
              								asm("lodsb");
              								asm("invalid");
              								_t45 = 0xc4;
              								_t39 = _t39 - 0x00000001 & _t48;
              								if(_t39 <= 0) {
              									continue;
              								} else {
              									asm("scasb");
              									_pop(_t56);
              									asm("wait");
              									asm("fbld tword [esi-0x48ea14d7]");
              									_t66 = _t66 - 1;
              									_t25 = 0x6b;
              									asm("adc bh, [edx]");
              									asm("popfd");
              									asm("lodsd");
              									_t32 = _t32 + 0x00000001 ^  *(_t39 - 0x48ee309a);
              									asm("cdq");
              									asm("iretw");
              									asm("adc [edi+0xaa000c], esi");
              									asm("pushad");
              									asm("rcl dword [ebx], cl");
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									 *0x6b =  *0x6b + 0x6b;
              									goto L8;
              								}
              								goto L11;
              							}
              						}
              					}
              				}
              				L11:
              				_push(_t32);
              				_push(_t66);
              				_t42 = _t39 - 1;
              				_t33 = _t32 + 1;
              				 *_t42 =  *_t42 + _t33;
              				 *_t25 =  *_t25 + _t25;
              				_t46 = _t45 + 1;
              				 *_t46 =  *_t46 + _t25;
              				 *_t33 =  *_t33 + _t66;
              				_push(0x746c0000);
              				 *_t25 =  *_t25 + _t25;
              				_push(0);
              				 *_t25 =  *_t25 + _t25;
              				 *_t25 =  *_t25 | _t25;
              				asm("adc [eax], dl");
              				 *_t25 =  *_t25 + _t25;
              				 *_t25 =  *_t25 + _t25;
              				 *_t25 =  *_t25 | _t25;
              				_push(0x86000005);
              				 *_t25 =  *_t25 + _t25;
              				 *_t25 =  *_t25 + _t46;
              				asm("adc [eax], al");
              				 *_t42 =  *_t42 + _t25;
              				 *_t25 =  *_t25 + _t25;
              				 *((intOrPtr*)(_t25 + 4)) =  *((intOrPtr*)(_t25 + 4)) + _t42;
              				 *_t25 =  *_t25 + _t25;
              				asm("out dx, al");
              				_t26 = _t25 + 0x18180000;
              				 *_t26 =  *_t26 + _t26;
              				 *_t26 =  *_t26 + _t26;
              				 *_t26 =  *_t26 | _t26;
              				asm("enter 0x6, 0x0");
              				_push(_t56 - 1 + 1);
              				_t27 = _t26 |  *_t26;
              				 *_t27 =  *_t27 + _t33;
              				asm("sbb [eax], al");
              				 *_t42 =  *_t42 + _t27;
              				 *_t27 =  *_t27 + _t27;
              				 *((intOrPtr*)(_t27 + 0x1e000009)) =  *((intOrPtr*)(_t27 + 0x1e000009)) + _t42;
              				asm("adc [eax], eax");
              				 *_t27 =  *_t27 + _t27;
              				 *_t27 =  *_t27 & _t27;
              				 *_t42 =  *_t42 + _t27;
              				 *_t27 =  *_t27 + _t42;
              				 *((intOrPtr*)(_t27 - 0x59fffff8)) =  *((intOrPtr*)(_t27 - 0x59fffff8)) + _t42;
              				asm("sbb al, [eax]");
              				 *_t27 =  *_t27 + _t27;
              				 *_t27 =  *_t27 & _t27;
              				 *_t42 =  *_t42 + _t27;
              				 *_t27 =  *_t27 + _t27;
              				 *((intOrPtr*)(_t27 + 0x4e000010)) =  *((intOrPtr*)(_t27 + 0x4e000010)) + _t42;
              				_t28 = _t27 &  *_t27;
              				 *_t28 =  *_t28 + _t46;
              				 *_t28 =  *_t28 ^ _t28;
              				 *_t42 =  *_t42 + _t28;
              				 *_t28 =  *_t28 + _t42;
              				 *((intOrPtr*)(_t28 - 0x9fffff2)) =  *((intOrPtr*)(_t28 - 0x9fffff2)) + _t42;
              				_t29 = _t28 ^  *_t28;
              				 *_t29 =  *_t29 + _t46;
              				 *_t29 =  *_t29 ^ _t29;
              				 *_t42 =  *_t42 + _t29;
              				 *_t29 =  *_t29 + _t29;
              				 *((intOrPtr*)(_t29 - 0x61ffffdb)) =  *((intOrPtr*)(_t29 - 0x61ffffdb)) + _t42;
              				 *_t29 =  *_t29 + _t29;
              				 *_t29 =  *_t29 - _t29;
              				 *_t29 =  *_t29 + _t29;
              				asm("adc [eax], al");
              				 *_t29 =  *_t29 + _t29;
              				 *_t29 =  *_t29 & _t29;
              				 *_t29 =  *_t29 + _t29;
              				 *_t29 =  *_t29 + _t29;
              				 *_t29 =  *_t29 | _t29;
              				 *_t29 =  *_t29 + _t29;
              				 *_t29 =  *_t29 + _t29;
              				_t30 = _t29 + 1;
              				 *_t30 =  *_t30 + _t30;
              				 *_t30 =  *_t30 + _t30;
              				 *_t30 =  *_t30 + _t30;
              				 *_t30 =  *_t30 + _t30;
              				 *_t30 =  *_t30 + _t30;
              				 *_t30 =  *_t30 + _t30;
              				 *_t30 =  *_t30 + _t30;
              				 *_t30 =  *_t30 + _t30;
              				 *_t30 =  *_t30 + _t30;
              				 *_t30 =  *_t30 + _t30;
              				 *_t30 =  *_t30 + _t30;
              				asm("invalid");
              				 *((intOrPtr*)(_t33 + _t33)) =  *((intOrPtr*)(_t33 + _t33)) + _t30;
              				 *_t30 =  *_t30 + 1;
              				asm("a16 scasb");
              				return _t30;
              			}























              0x00401944
              0x00401944
              0x00401944
              0x00401944
              0x00401949
              0x0040194e
              0x00401950
              0x00401952
              0x00401954
              0x00401956
              0x00401958
              0x00401959
              0x0040195b
              0x0040195d
              0x00401961
              0x00401962
              0x00401965
              0x00401967
              0x0040196a
              0x00401970
              0x00401972
              0x00401974
              0x00401976
              0x00401978
              0x0040197a
              0x0040197b
              0x0040197d
              0x0040197e
              0x0040197e
              0x00401981
              0x004019e9
              0x004019e9
              0x004019eb
              0x00000000
              0x00401984
              0x00401984
              0x00401985
              0x004019ec
              0x004019ec
              0x004019f2
              0x00000000
              0x00401987
              0x00401987
              0x004019f7
              0x004019f7
              0x004019fb
              0x00401a00
              0x00401a02
              0x00401a05
              0x00401a08
              0x00401a09
              0x00401a0a
              0x00401a10
              0x00401a12
              0x00401a15
              0x00401a16
              0x00401a17
              0x00401989
              0x00401989
              0x0040198c
              0x0040198e
              0x0040198f
              0x0040198f
              0x00401991
              0x00401993
              0x00401995
              0x00401996
              0x00401998
              0x0040199a
              0x00000000
              0x00000000
              0x0040199c
              0x0040199d
              0x0040199e
              0x004019a1
              0x004019a3
              0x004019a5
              0x00000000
              0x004019a7
              0x004019a7
              0x004019a8
              0x004019a9
              0x004019aa
              0x004019b0
              0x004019b1
              0x004019b3
              0x004019b6
              0x004019bb
              0x004019bc
              0x004019bd
              0x004019be
              0x004019c0
              0x004019c6
              0x004019c7
              0x004019cd
              0x004019cf
              0x004019d1
              0x004019d3
              0x004019d5
              0x004019d7
              0x004019d9
              0x004019db
              0x004019dd
              0x004019df
              0x004019e1
              0x004019e3
              0x004019e5
              0x004019e7
              0x00000000
              0x004019e7
              0x00000000
              0x004019a5
              0x0040198f
              0x00401987
              0x00401985
              0x00401a18
              0x00401a18
              0x00401a19
              0x00401a1a
              0x00401a1b
              0x00401a1c
              0x00401a1e
              0x00401a20
              0x00401a21
              0x00401a23
              0x00401a26
              0x00401a2b
              0x00401a2e
              0x00401a33
              0x00401a35
              0x00401a37
              0x00401a39
              0x00401a3b
              0x00401a3d
              0x00401a3f
              0x00401a44
              0x00401a46
              0x00401a48
              0x00401a4a
              0x00401a4c
              0x00401a4e
              0x00401a51
              0x00401a53
              0x00401a54
              0x00401a59
              0x00401a5b
              0x00401a5d
              0x00401a5f
              0x00401a63
              0x00401a64
              0x00401a66
              0x00401a68
              0x00401a6a
              0x00401a6c
              0x00401a6e
              0x00401a74
              0x00401a76
              0x00401a78
              0x00401a7a
              0x00401a7c
              0x00401a7e
              0x00401a84
              0x00401a86
              0x00401a88
              0x00401a8a
              0x00401a8c
              0x00401a8e
              0x00401a94
              0x00401a96
              0x00401a98
              0x00401a9a
              0x00401a9c
              0x00401a9e
              0x00401aa4
              0x00401aa6
              0x00401aa8
              0x00401aaa
              0x00401aac
              0x00401aae
              0x00401ab5
              0x00401ab7
              0x00401ab9
              0x00401abb
              0x00401abd
              0x00401abf
              0x00401ac1
              0x00401ac3
              0x00401ac5
              0x00401ac7
              0x00401ac9
              0x00401acb
              0x00401acc
              0x00401ace
              0x00401ad0
              0x00401ad2
              0x00401ad4
              0x00401ad6
              0x00401ad8
              0x00401ada
              0x00401adc
              0x00401ade
              0x00401ae0
              0x00401ae4
              0x00401ae6
              0x00401aed
              0x00401aef
              0x00401af1

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: #100
              • String ID: VB5!6&*
              • API String ID: 1341478452-3593831657
              • Opcode ID: 49eda9988085b2c0d92c1db57d33f6987569df7de6b7888ac88843bf5002f541
              • Instruction ID: 91babe460517667bceb3096b77b6d23548d5d38539658dc8f7a893e3b9818c0e
              • Opcode Fuzzy Hash: 49eda9988085b2c0d92c1db57d33f6987569df7de6b7888ac88843bf5002f541
              • Instruction Fuzzy Hash: 255173A148E7C06FD34397709C2AA923FB49E53229B1A46DBC0C2DF4B3E1580C5AC776
              Uniqueness

              Uniqueness Score: -1.00%

              Non-executed Functions

              Control-flow Graph

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 0042ACEB
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042AD04
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042AD23
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,00000218), ref: 0042AD42
              • __vbaFreeObj.MSVBVM60 ref: 0042AD4B
              • __vbaStrCopy.MSVBVM60 ref: 0042AD59
              • #524.MSVBVM60(?,?), ref: 0042AD74
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 0042AD90
              • __vbaFreeVar.MSVBVM60 ref: 0042AD9C
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042ADBE
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042ADD7
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,00000148), ref: 0042ADFA
              • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 0042AE0A
              • __vbaStrVarMove.MSVBVM60(00000000), ref: 0042AE14
              • __vbaStrMove.MSVBVM60 ref: 0042AE1F
              • #531.MSVBVM60(00000000), ref: 0042AE26
              • __vbaFreeStr.MSVBVM60 ref: 0042AE2F
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0042AE3F
              • __vbaFreeVar.MSVBVM60 ref: 0042AE4B
              • #709.MSVBVM60(ABC,00409944,000000FF,00000000), ref: 0042AE5E
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042AE7F
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,0000004C), ref: 0042AEA4
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409994,0000001C), ref: 0042AEEE
              • __vbaObjSet.MSVBVM60(?,?), ref: 0042AF03
              • __vbaFreeObj.MSVBVM60 ref: 0042AF0C
              • __vbaFreeStr.MSVBVM60(0042AF60), ref: 0042AF4F
              • __vbaFreeObj.MSVBVM60 ref: 0042AF54
              • __vbaFreeStr.MSVBVM60 ref: 0042AF5D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$New2$CopyMove$#524#531#709CallLateList
              • String ID: ABC
              • API String ID: 1356135559-2743272264
              • Opcode ID: 4402aa67ae52609cd76e0a28bc0f930c41db4765ca7df24a4c469628892f9cb1
              • Instruction ID: 019fa39903f28019cc1a476a41a1802a4c54f4f6bf8582c91c61d3c19f127ddf
              • Opcode Fuzzy Hash: 4402aa67ae52609cd76e0a28bc0f930c41db4765ca7df24a4c469628892f9cb1
              • Instruction Fuzzy Hash: 7B813C71D002099BCB04DFA5D988EDEBBB8FF58304F10812AE516B72B0DB749945CF69
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 0042B217
              • __vbaStrCopy.MSVBVM60 ref: 0042B21F
              • #646.MSVBVM60(?), ref: 0042B233
              • __vbaStrMove.MSVBVM60 ref: 0042B23E
              • __vbaStrCmp.MSVBVM60(goglet,00000000), ref: 0042B24A
              • __vbaFreeStr.MSVBVM60 ref: 0042B25C
              • __vbaFreeVar.MSVBVM60 ref: 0042B265
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,004095E0,00000160), ref: 0042B296
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042B2AE
              • __vbaObjSet.MSVBVM60(?,?,Friturekurvens8), ref: 0042B2CC
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000040), ref: 0042B2E6
              • __vbaFreeObj.MSVBVM60 ref: 0042B2EF
              • #660.MSVBVM60(?,0000000A,?,00000001,00000001), ref: 0042B322
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 0042B343
              • __vbaFreeVarList.MSVBVM60(00000003,00000002,0000000A,?), ref: 0042B35A
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042B37F
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042B398
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409AE8,000000E8), ref: 0042B3C2
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042B3DA
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000034,?,?,?,?), ref: 0042B426
              • __vbaObjSet.MSVBVM60(?,?,?,?,?,?), ref: 0042B437
              • __vbaFreeObj.MSVBVM60(?,?,?,?), ref: 0042B440
              • __vbaFreeStr.MSVBVM60(0042B4A3), ref: 0042B492
              • __vbaFreeStr.MSVBVM60 ref: 0042B497
              • __vbaFreeObj.MSVBVM60 ref: 0042B49C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$New2$Copy$#646#660ListMove
              • String ID: Friturekurvens8$goglet$s
              • API String ID: 1853211704-556132612
              • Opcode ID: bf65de5dd9fe6949bb4f581fec849fe0bbfa160f7676709f708f0f64e1082751
              • Instruction ID: bf9f8ab7a2f5857480c09b3296be6fb03b9b97a34af5382506ca136ba3c370f0
              • Opcode Fuzzy Hash: bf65de5dd9fe6949bb4f581fec849fe0bbfa160f7676709f708f0f64e1082751
              • Instruction Fuzzy Hash: F3815DB1E00218DBCB14DF95DD88ADEBBB8FF58700F10801AE516B72A1D7745945CFA9
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaAryConstruct2.MSVBVM60(?,00409A28,00000005), ref: 0042382F
              • #517.MSVBVM60(004099E0), ref: 0042383A
              • __vbaStrMove.MSVBVM60 ref: 00423845
              • __vbaStrCmp.MSVBVM60(004099E8,00000000), ref: 00423851
              • __vbaFreeStr.MSVBVM60 ref: 00423864
              • #685.MSVBVM60 ref: 00423873
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423884
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 004238BD
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 004238D6
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001D8), ref: 004238FC
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004099EC,00000044), ref: 0042392F
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0042393F
              • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 00423957
              • #682.MSVBVM60(?,?), ref: 004239A1
              • __vbaFpR8.MSVBVM60 ref: 004239A7
              • __vbaFreeVar.MSVBVM60 ref: 004239C6
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 004239E9
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,0000001C), ref: 00423A0E
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,004099C4,00000060), ref: 00423A5B
              • __vbaFreeObj.MSVBVM60 ref: 00423A64
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00423A7D
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423A96
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,00000108), ref: 00423AC0
              • __vbaFreeObj.MSVBVM60 ref: 00423AD2
              • __vbaAryDestruct.MSVBVM60(00000000,?,00423B2E), ref: 00423B27
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$New2$List$#517#682#685Construct2DestructMove
              • String ID: Lupanar
              • API String ID: 1762197567-3217326196
              • Opcode ID: 7cdf8f706f59b0e4631993192e1dc9367a281487de0b6dfa5ac4e8c37e419777
              • Instruction ID: 6919a7ced6d8492ad7f433be0b2f01ba77bf40c0d1d1f1b8092efad30218e59f
              • Opcode Fuzzy Hash: 7cdf8f706f59b0e4631993192e1dc9367a281487de0b6dfa5ac4e8c37e419777
              • Instruction Fuzzy Hash: 24A14CB1A00218AFCB14DF94DD88EDEBBB8FB08701F50416EE545B72A1DB745985CF58
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 00429BD3
              • __vbaStrCopy.MSVBVM60 ref: 00429BDD
              • #523.MSVBVM60(?), ref: 00429BE3
              • __vbaStrMove.MSVBVM60 ref: 00429BEE
              • __vbaStrCmp.MSVBVM60(004096FC,00000000), ref: 00429BFA
              • __vbaFreeStr.MSVBVM60 ref: 00429C0D
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 00429C2E
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,0000004C), ref: 00429C53
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409994,0000001C), ref: 00429CA1
              • __vbaObjSet.MSVBVM60(?,?), ref: 00429CB2
              • __vbaFreeObj.MSVBVM60 ref: 00429CBB
              • #711.MSVBVM60(?,00409D90,?,000000FF,00000000), ref: 00429CDF
              • __vbaAryVar.MSVBVM60(00002008,?), ref: 00429CEE
              • __vbaAryCopy.MSVBVM60(?,?), ref: 00429D05
              • __vbaFreeVarList.MSVBVM60(00000002,0000000A,?), ref: 00429D15
              • __vbaGenerateBoundsError.MSVBVM60 ref: 00429D37
              • __vbaGenerateBoundsError.MSVBVM60 ref: 00429D49
              • __vbaStrCmp.MSVBVM60(004099E8,00000000), ref: 00429D5E
              • __vbaLateMemCall.MSVBVM60(?,A9IWnV6OU8nxkkGgvYnrokBiEqWu46,00000002), ref: 00429DB3
              • __vbaFreeObj.MSVBVM60(00429E1D), ref: 00429DF9
              • __vbaFreeObj.MSVBVM60 ref: 00429DFE
              • __vbaFreeStr.MSVBVM60 ref: 00429E09
              • __vbaFreeStr.MSVBVM60 ref: 00429E0E
              • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00429E16
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$Copy$BoundsCheckErrorGenerateHresult$#523#711CallDestructLateListMoveNew2
              • String ID: A9IWnV6OU8nxkkGgvYnrokBiEqWu46$OVOVIVIPARISM
              • API String ID: 1438792996-4169294878
              • Opcode ID: 63789d63c8acf54cf6b6b09270433d521245be547650567a70934f85d16422f9
              • Instruction ID: c2338e75e0db7d90ff4dbfe4fdf3377c01d2bc52383e6d45243d624f8c4f2cc0
              • Opcode Fuzzy Hash: 63789d63c8acf54cf6b6b09270433d521245be547650567a70934f85d16422f9
              • Instruction Fuzzy Hash: F7810AB1E002189FCB14DFA9DA85AEDBBB8FF48700F20816AE505B72A1D7746D45CF94
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaVarDup.MSVBVM60 ref: 00423BB7
              • #547.MSVBVM60(?,?), ref: 00423BC5
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 00423BE1
              • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00423BF4
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 00423C18
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,0000001C), ref: 00423C3D
              • __vbaCastObj.MSVBVM60(?,00409A58), ref: 00423C74
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423C85
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,004099C4,00000058), ref: 00423C9B
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00423CAB
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00423CD1
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423CEA
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00423D0F
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423D28
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,000000A0), ref: 00423D4B
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 00423D8C
              • __vbaFreeStr.MSVBVM60 ref: 00423D95
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00423DA5
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00423DC1
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423DDA
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 00423E24
              • __vbaFreeObj.MSVBVM60 ref: 00423E2D
              • __vbaFreeObj.MSVBVM60(00423E7C), ref: 00423E75
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$New2$List$#547Cast
              • String ID: 12:12:12$Sorgers
              • API String ID: 1739637979-3902600086
              • Opcode ID: 7e320e61fa50c169369a9d2cffdc19d4d4a738bbe20561f2f5652bc8f8c09cb6
              • Instruction ID: 1107faa603f927594049e00d2eb2bb7a484343d29e13ec7b35f34450520a4ada
              • Opcode Fuzzy Hash: 7e320e61fa50c169369a9d2cffdc19d4d4a738bbe20561f2f5652bc8f8c09cb6
              • Instruction Fuzzy Hash: C1915CB1A003099FCB04DFA5D948EDEBBB8FF48705F20452AE545B72A1D7789A05CF68
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • #521.MSVBVM60(00409894), ref: 00424367
              • __vbaStrMove.MSVBVM60 ref: 00424372
              • __vbaStrCmp.MSVBVM60(004098A0,00000000), ref: 0042437E
              • __vbaFreeStr.MSVBVM60 ref: 00424391
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 004243B3
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 004243CC
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,00000170), ref: 004243F3
              • __vbaLateMemCall.MSVBVM60(?,MsjfpH140,00000002), ref: 0042444B
              • __vbaFreeObj.MSVBVM60 ref: 00424457
              • __vbaFreeVar.MSVBVM60 ref: 00424460
              • #610.MSVBVM60(?), ref: 00424470
              • __vbaStrVarVal.MSVBVM60(?,?), ref: 0042447A
              • #540.MSVBVM60(?,00000000), ref: 00424485
              • #610.MSVBVM60(?), ref: 0042448F
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 00424499
              • __vbaFreeStr.MSVBVM60 ref: 004244A5
              • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 004244B9
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 004244DD
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,0000004C), ref: 00424502
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409994,0000001C,?,?,?,?), ref: 00424550
              • __vbaObjSet.MSVBVM60(?,?,?,?,?,?), ref: 00424561
              • __vbaFreeObj.MSVBVM60(?,?,?,?), ref: 0042456A
              • __vbaFreeObj.MSVBVM60(004245BD), ref: 004245B5
              • __vbaFreeObj.MSVBVM60 ref: 004245BA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$#610New2$#521#540CallLateListMove
              • String ID: MsjfpH140
              • API String ID: 878090992-88622464
              • Opcode ID: a7bda9d2ab3e0d83f62c3709be9e0feac5a60337a4b9359679c366c156215759
              • Instruction ID: d2a5e1b81b6901b3a38112d60fa1c7e121b6a8422199cb4e5bbd85aacf3e2d93
              • Opcode Fuzzy Hash: a7bda9d2ab3e0d83f62c3709be9e0feac5a60337a4b9359679c366c156215759
              • Instruction Fuzzy Hash: 6C813FB1D00219DFCB14DFA4DA84AEEBBF8FF48700F10816AE545B7264D6786A45CF94
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 004298EA
              • __vbaStrCopy.MSVBVM60 ref: 004298F2
              • #594.MSVBVM60(?), ref: 00429906
              • __vbaFreeVar.MSVBVM60 ref: 0042990F
              • __vbaVarDup.MSVBVM60 ref: 00429929
              • #543.MSVBVM60(?,0000000A), ref: 00429937
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 00429953
              • __vbaFreeVarList.MSVBVM60(00000002,0000000A,?), ref: 00429966
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042998A
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,0000001C), ref: 004299AF
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,004099C4,0000005C,?,?,?,?), ref: 00429A03
              • __vbaStrMove.MSVBVM60(?,?,?,?), ref: 00429A12
              • __vbaFreeObj.MSVBVM60(?,?,?,?), ref: 00429A1B
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00429A34
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00429A53
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,000001C4), ref: 00429A72
              • __vbaFreeObj.MSVBVM60 ref: 00429A7B
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00429A94
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00429AAD
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000000D8), ref: 00429AD0
              • __vbaFreeObj.MSVBVM60 ref: 00429ADF
              • __vbaFreeStr.MSVBVM60(00429B2C), ref: 00429B1F
              • __vbaFreeStr.MSVBVM60 ref: 00429B24
              • __vbaFreeStr.MSVBVM60 ref: 00429B29
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$New2$Copy$#543#594ListMove
              • String ID: 18:18:18
              • API String ID: 1461875154-2086002022
              • Opcode ID: 8e406b39bc9f3d78433d19acf88d2b60d36146bc365a2dba7c4bae9ac5ff6c2a
              • Instruction ID: 9c31e9c753143ea41fe9ac48934a9cf0c38919b3a719b6a4ee4b6fbbff310328
              • Opcode Fuzzy Hash: 8e406b39bc9f3d78433d19acf88d2b60d36146bc365a2dba7c4bae9ac5ff6c2a
              • Instruction Fuzzy Hash: 1A81EBB1E002199FCB14DFA5D988EDEBBB8FB4C704F10802AE515B72A0DB745945CFA8
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00423F1D
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423F3C
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00423F61
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423F7A
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,000001B8), ref: 00423F9D
              • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 00423FCB
              • __vbaStrVarMove.MSVBVM60(00000000), ref: 00423FD5
              • __vbaStrMove.MSVBVM60 ref: 00423FE0
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 00424000
              • __vbaFreeStr.MSVBVM60 ref: 00424009
              • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 0042401D
              • __vbaFreeVar.MSVBVM60 ref: 0042402F
              • __vbaRedim.MSVBVM60(00000880,00000010,?,00000000,00000001,00000003,00000000), ref: 00424042
              • __vbaVarMove.MSVBVM60 ref: 0042406F
              • __vbaVarMove.MSVBVM60 ref: 0042409B
              • __vbaVarMove.MSVBVM60 ref: 004240B8
              • __vbaVarMove.MSVBVM60 ref: 004240E1
              • #665.MSVBVM60(?,3F800000,?), ref: 004240F0
              • __vbaErase.MSVBVM60(00000000,?), ref: 004240FC
              • __vbaVarTstNe.MSVBVM60(00008002,?), ref: 0042411D
              • __vbaFreeVar.MSVBVM60 ref: 00424129
              • __vbaFpI4.MSVBVM60 ref: 0042413B
              • __vbaHresultCheckObj.MSVBVM60(00000000,00401270,004095E0,00000064), ref: 0042415B
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 00424178
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000014), ref: 0042419D
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409A7C,00000078), ref: 004241C0
              • __vbaFreeObj.MSVBVM60 ref: 004241C5
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Move$CheckFreeHresult$New2$#665CallEraseLateListRedim
              • String ID:
              • API String ID: 3732751907-0
              • Opcode ID: 6931b81dc6296275856ad9d8656f347a2926c25dd5a789418d9c3a7316947dcc
              • Instruction ID: 1a36d92ee96962d438fd72feedd016aa527698249dcf8a02f9326689a93b09b9
              • Opcode Fuzzy Hash: 6931b81dc6296275856ad9d8656f347a2926c25dd5a789418d9c3a7316947dcc
              • Instruction Fuzzy Hash: 60A14B71E00218AFDB14DFA9DD48EAEBBB8FF58300F10815AE506B7261D774A945CF64
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 00429E92
              • #594.MSVBVM60(?), ref: 00429EAA
              • __vbaFreeVar.MSVBVM60 ref: 00429EB3
              • __vbaVarDup.MSVBVM60 ref: 00429ECD
              • #543.MSVBVM60(?,0000000A), ref: 00429EDB
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 00429EF7
              • __vbaFreeVarList.MSVBVM60(00000002,0000000A,?), ref: 00429F0A
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 00429F2E
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,0000001C), ref: 00429F53
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,004099C4,0000005C,?,?,?,?), ref: 00429F9F
              • __vbaStrMove.MSVBVM60(?,?,?,?), ref: 00429FAE
              • __vbaFreeObj.MSVBVM60(?,?,?,?), ref: 00429FB7
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00429FD0
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00429FEF
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,0000020C), ref: 0042A00E
              • __vbaFreeObj.MSVBVM60 ref: 0042A017
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042A030
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042A049
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,00000190), ref: 0042A06C
              • __vbaFreeObj.MSVBVM60 ref: 0042A07B
              • __vbaFreeStr.MSVBVM60(0042A0C3), ref: 0042A0BB
              • __vbaFreeStr.MSVBVM60 ref: 0042A0C0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$New2$#543#594CopyListMove
              • String ID: 18:18:18
              • API String ID: 591326717-2086002022
              • Opcode ID: 43acfb3afcf2742f82e8c2d921190aa7295acc4979548707f980f13c2fb6515c
              • Instruction ID: 7c1f7619c0a0d873a8bfee80a1bcd62021c347000abb2f3199390cb1b37cc23b
              • Opcode Fuzzy Hash: 43acfb3afcf2742f82e8c2d921190aa7295acc4979548707f980f13c2fb6515c
              • Instruction Fuzzy Hash: DA714EB1E002099FCB14DFA5DA88EDEBBB8FF48304F20452AE505B72A1D7745A45CF69
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 264 423390-4233f8 __vbaInStr 266 423489 264->266 267 4233fe-423404 264->267 268 42348f-4234ca #598 #670 __vbaVarTstEq __vbaFreeVar 266->268 269 423416-42342a 267->269 270 423406-423410 __vbaNew2 267->270 271 423530-423537 268->271 272 4234cc-4234d2 268->272 278 42343f 269->278 279 42342c-42343d __vbaHresultCheckObj 269->279 270->269 273 423539-423549 __vbaNew2 271->273 274 42354e-423572 __vbaObjSet 271->274 275 4234e4-4234f8 272->275 276 4234d4-4234de __vbaNew2 272->276 273->274 289 423574-42357d __vbaHresultCheckObj 274->289 290 42357f-4235c5 __vbaFreeObj __vbaFreeStr 274->290 283 423505-42351a 275->283 284 4234fa-423503 __vbaHresultCheckObj 275->284 276->275 282 423445-423462 278->282 279->282 287 423464-42346d __vbaHresultCheckObj 282->287 288 42346f-423487 __vbaStrMove __vbaFreeObj 282->288 293 423527-42352a __vbaFreeObj 283->293 294 42351c-423525 __vbaHresultCheckObj 283->294 284->283 287->288 288->268 289->290 293->271 294->293
              APIs
              • __vbaInStr.MSVBVM60(00000000,00409944,ABC,00000002), ref: 004233EF
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 00423410
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,0000004C), ref: 0042343B
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409994,00000024), ref: 0042346D
              • __vbaStrMove.MSVBVM60 ref: 00423478
              • __vbaFreeObj.MSVBVM60 ref: 00423481
              • #598.MSVBVM60 ref: 0042348F
              • #670.MSVBVM60(?), ref: 00423499
              • __vbaVarTstEq.MSVBVM60(?,?), ref: 004234B5
              • __vbaFreeVar.MSVBVM60 ref: 004234C1
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 004234DE
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,0000001C), ref: 00423503
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,004099C4,00000064), ref: 00423525
              • __vbaFreeObj.MSVBVM60 ref: 0042352A
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00423543
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042355C
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098C8,00000078), ref: 0042357D
              • __vbaFreeObj.MSVBVM60 ref: 00423588
              • __vbaFreeStr.MSVBVM60(004235C6), ref: 004235BF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckFreeHresult$New2$#598#670Move
              • String ID: ABC$CIVILARBEJDERNE$Trafikfarligeres7$vinterstvler
              • API String ID: 1029844685-2426219459
              • Opcode ID: 1700827b7520ed638ee4999568400f7ef2899d7e42215344419fb930d7f41e94
              • Instruction ID: a90eb44c8bf46a3c4d8b18ad8917b7d15d01cff0ec85c01d5deb78bcb31b5541
              • Opcode Fuzzy Hash: 1700827b7520ed638ee4999568400f7ef2899d7e42215344419fb930d7f41e94
              • Instruction Fuzzy Hash: CB5151B1A00219ABCB10EF95DD88EDEBBB8FF08705F50442AE505B72A1D7789985CF58
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaAryConstruct2.MSVBVM60(?,00409E04,00000008), ref: 0042A34D
              • #708.MSVBVM60(?,?,004096FC,000000FF,00000000), ref: 0042A376
              • __vbaAryVar.MSVBVM60(00002008,?), ref: 0042A385
              • __vbaAryCopy.MSVBVM60(?,?), ref: 0042A396
              • __vbaFreeVar.MSVBVM60 ref: 0042A39F
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042A3B8
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042A3D7
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042A3FC
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042A415
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,00000150), ref: 0042A438
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 0042A479
              • __vbaFreeStr.MSVBVM60 ref: 0042A482
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0042A492
              • __vbaR8Str.MSVBVM60(00409DFC), ref: 0042A4A0
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042A4CA
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042A4E3
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,00000108), ref: 0042A50A
              • #600.MSVBVM60(?,00000002), ref: 0042A526
              • __vbaFreeObj.MSVBVM60 ref: 0042A531
              • __vbaFreeVar.MSVBVM60 ref: 0042A53A
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042A553
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042A56C
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,000001A0), ref: 0042A593
              • __vbaFreeObj.MSVBVM60 ref: 0042A5A2
              • __vbaAryDestruct.MSVBVM60(00000000,?,0042A5F3), ref: 0042A5E9
              • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042A5F0
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresultNew2$Destruct$#600#708Construct2CopyList
              • String ID:
              • API String ID: 2289096559-0
              • Opcode ID: aefea1e797520f528af481961eba607ceb4d9d28586e1957f718d5b7c55e2817
              • Instruction ID: e96acbbacde2b42aac6d849f5387ecaf2f1bfaa04a3b58b6e3f3e403ee98fc94
              • Opcode Fuzzy Hash: aefea1e797520f528af481961eba607ceb4d9d28586e1957f718d5b7c55e2817
              • Instruction Fuzzy Hash: 08911B70A00218AFCB14DFA4DD88E9EBBB8FF48700F20852AE555B72A1DB745946CF58
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaVarDup.MSVBVM60 ref: 0042C123
              • #591.MSVBVM60(?), ref: 0042C12D
              • __vbaStrMove.MSVBVM60 ref: 0042C138
              • __vbaStrCmp.MSVBVM60(String,00000000), ref: 0042C144
              • __vbaFreeStr.MSVBVM60 ref: 0042C157
              • __vbaFreeVar.MSVBVM60 ref: 0042C160
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042C182
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042C1A1
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001D0), ref: 0042C1C4
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042C1DC
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000034), ref: 0042C22D
              • __vbaObjSet.MSVBVM60(?,?), ref: 0042C23E
              • __vbaFreeObj.MSVBVM60 ref: 0042C243
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042C264
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042C27D
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000000D8), ref: 0042C2A0
              • __vbaFreeObj.MSVBVM60 ref: 0042C2AF
              • __vbaFreeObj.MSVBVM60(0042C2EC), ref: 0042C2E5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresultNew2$#591Move
              • String ID: Dietical$String
              • API String ID: 1247683541-1333297720
              • Opcode ID: 829ba65b0ac7181a06c74d5a7ad7a7b1e33c015182c242c63929e931aa0a91a3
              • Instruction ID: e2719e67f41acf9731d276d0ad32b9f72c136bf66020234ce0d00883806fac9e
              • Opcode Fuzzy Hash: 829ba65b0ac7181a06c74d5a7ad7a7b1e33c015182c242c63929e931aa0a91a3
              • Instruction Fuzzy Hash: D0511BB1E00214DFCB14DFA4D988ADEBBB4BB0C704F54456AE546F7260DB345946CFA8
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 00423199
              • #615.MSVBVM60 ref: 0042319F
              • #572.MSVBVM60(?), ref: 004231B7
              • __vbaStrMove.MSVBVM60 ref: 004231C2
              • __vbaStrCmp.MSVBVM60(004098EC,00000000), ref: 004231CE
              • __vbaFreeStr.MSVBVM60 ref: 004231E1
              • __vbaFreeVar.MSVBVM60 ref: 004231EA
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042320C
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423225
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,00000108), ref: 0042324C
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 00423264
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000038,?,?,?,?,?), ref: 004232D0
              • __vbaVar2Vec.MSVBVM60(?,?,?,?,?,?,?), ref: 004232DE
              • __vbaAryMove.MSVBVM60(?,?,?,?,?,?,?), ref: 004232EC
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?), ref: 004232F5
              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,?,?), ref: 00423305
              • __vbaAryDestruct.MSVBVM60(00000000,?,00423365), ref: 00423355
              • __vbaFreeStr.MSVBVM60 ref: 0042335E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresultMoveNew2$#572#615CopyDestructListVar2
              • String ID: K$37K
              • API String ID: 2097586051-3885948781
              • Opcode ID: 175de24e89d600b7d9321dd89c514243c73e6f19de87cbb514bf8595f21f5245
              • Instruction ID: d1201d3794426a9c721f4b7469a9998aa619a47a8f623e5e69e74982762e368b
              • Opcode Fuzzy Hash: 175de24e89d600b7d9321dd89c514243c73e6f19de87cbb514bf8595f21f5245
              • Instruction Fuzzy Hash: 6E514B71D002089FCB04DFA4DA88ADEBBF8FF58701F10806AE546B7260DB745946CF69
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00424633
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042464C
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 0042469A
              • __vbaFreeObj.MSVBVM60 ref: 004246A3
              • __vbaStrCopy.MSVBVM60 ref: 004246B1
              • #619.MSVBVM60(?,?,00000001), ref: 004246CE
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 004246EA
              • __vbaFreeVar.MSVBVM60 ref: 004246FC
              • __vbaVarDup.MSVBVM60 ref: 00424717
              • #667.MSVBVM60(?), ref: 00424721
              • __vbaStrMove.MSVBVM60 ref: 0042472C
              • __vbaFreeVar.MSVBVM60 ref: 00424735
              • #589.MSVBVM60(00000001), ref: 00424739
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,004095E0,00000084), ref: 0042477A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$#589#619#667CopyMoveNew2
              • String ID: Dosers9$EGNETHEDERNES$var
              • API String ID: 2589535015-2811488698
              • Opcode ID: 36b1d96c5fa19d7a7f522ad137d06dd88625373c1965ca87e464454d5e1572b9
              • Instruction ID: 54af31cc7f7bbb9681bd49f02a48856f2db9d806f7ff97e98bc4ec8b44291fe0
              • Opcode Fuzzy Hash: 36b1d96c5fa19d7a7f522ad137d06dd88625373c1965ca87e464454d5e1572b9
              • Instruction Fuzzy Hash: 22516E71D002499FCB04DFA4D988ADEBBB8FF48700F50842AE155B72A0DB785906CF58
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 0042A142
              • #648.MSVBVM60(?), ref: 0042A15A
              • __vbaFreeVar.MSVBVM60 ref: 0042A163
              • #521.MSVBVM60(00409894), ref: 0042A16E
              • __vbaStrMove.MSVBVM60 ref: 0042A179
              • __vbaStrCmp.MSVBVM60(004098A0,00000000), ref: 0042A185
              • __vbaFreeStr.MSVBVM60 ref: 0042A198
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042A1B5
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000034), ref: 0042A1FF
              • __vbaObjSet.MSVBVM60(?,?), ref: 0042A210
              • #606.MSVBVM60(00000001,0000000A), ref: 0042A22D
              • __vbaStrMove.MSVBVM60 ref: 0042A238
              • __vbaStrCmp.MSVBVM60(004099D8,00000000), ref: 0042A244
              • __vbaFreeStr.MSVBVM60 ref: 0042A257
              • __vbaFreeVar.MSVBVM60 ref: 0042A260
              • __vbaHresultCheckObj.MSVBVM60(00000000,004014E0,00409610,00000774), ref: 0042A284
              • __vbaFreeStr.MSVBVM60(0042A2C8), ref: 0042A2B8
              • __vbaFreeObj.MSVBVM60 ref: 0042A2C1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresultMove$#521#606#648CopyNew2
              • String ID:
              • API String ID: 489329638-3916222277
              • Opcode ID: e08c80697a30fb5a137ebba682de15eb3add6a93e05079ea32386b54b9d7ff12
              • Instruction ID: f682ea340545ceb7c6ff4110244f091946a207170298ef879205030317eb7471
              • Opcode Fuzzy Hash: e08c80697a30fb5a137ebba682de15eb3add6a93e05079ea32386b54b9d7ff12
              • Instruction Fuzzy Hash: FC514E71E00218DFCB04DFA5EA89ADDBBB8EF48704F10812AF902B7261DB745945CF69
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • #616.MSVBVM60(00409B50,00000001), ref: 0042BA30
              • __vbaStrMove.MSVBVM60 ref: 0042BA3B
              • __vbaStrCmp.MSVBVM60(004099E0,00000000), ref: 0042BA47
              • __vbaFreeStr.MSVBVM60 ref: 0042BA5A
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042BA7C
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042BA95
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,00000170), ref: 0042BABC
              • __vbaFpI4.MSVBVM60 ref: 0042BACA
              • __vbaHresultCheckObj.MSVBVM60(00000000,004015D0,004095E0,000002C8), ref: 0042BB05
              • __vbaFreeObj.MSVBVM60 ref: 0042BB0E
              • __vbaStrCopy.MSVBVM60 ref: 0042BB1C
              • #618.MSVBVM60(?,00000001), ref: 0042BB28
              • __vbaStrMove.MSVBVM60 ref: 0042BB33
              • __vbaStrCmp.MSVBVM60(00409AC4,00000000), ref: 0042BB3F
              • __vbaFreeStr.MSVBVM60 ref: 0042BB52
              • __vbaFileOpen.MSVBVM60(00000020,000000FF,00000016,Kausalitets6), ref: 0042BB68
              • __vbaFreeStr.MSVBVM60(0042BBA1), ref: 0042BB9A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresultMove$#616#618CopyFileNew2Open
              • String ID: Kausalitets6$var
              • API String ID: 1924590394-4254552659
              • Opcode ID: 7a33d5dd95cb64a87c6e263e7e384cfbb01136386483540541b45013638d7dcc
              • Instruction ID: a605319d66e035244b0b246057bedf3e00610c53080f728bf52674ca3f05bad5
              • Opcode Fuzzy Hash: 7a33d5dd95cb64a87c6e263e7e384cfbb01136386483540541b45013638d7dcc
              • Instruction Fuzzy Hash: 73416E71A00214AFCB14DFA5DE89EEE7BB4FB4C701F604129F602B72A0DB785945CB98
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaVarDup.MSVBVM60 ref: 00422EE7
              • #522.MSVBVM60(?,?), ref: 00422EF1
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 00422F0D
              • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00422F20
              • __vbaVarDup.MSVBVM60 ref: 00422F42
              • #667.MSVBVM60(?), ref: 00422F48
              • __vbaStrMove.MSVBVM60 ref: 00422F53
              • __vbaFreeVar.MSVBVM60 ref: 00422F5C
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00422F75
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00422F94
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098C8,000001AC), ref: 00422FB3
              • __vbaFreeObj.MSVBVM60 ref: 00422FBC
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00422FD5
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00422FEE
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,00000208), ref: 0042300D
              • __vbaFreeObj.MSVBVM60 ref: 00423016
              • __vbaFreeStr.MSVBVM60(0042305C), ref: 00423055
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresultNew2$#522#667ListMove
              • String ID: knopskydninger
              • API String ID: 2357291029-3678261433
              • Opcode ID: 8099b4a92f6c3bb3c7ca72edbfa62cbe811e1630157bc9a811e0c16f4ee2326e
              • Instruction ID: 7ce3e391193b74bbe529d618f7eaf8ae1e3447217da33b1234a3cb3d16451c68
              • Opcode Fuzzy Hash: 8099b4a92f6c3bb3c7ca72edbfa62cbe811e1630157bc9a811e0c16f4ee2326e
              • Instruction Fuzzy Hash: 7B513F71900219AFCB10EF94DD88EDEBBB4FF48304F54452AE546B72A0DB785509CF58
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 0042C375
              • #648.MSVBVM60(?), ref: 0042C38D
              • __vbaFreeVar.MSVBVM60 ref: 0042C396
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042C3AE
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000014), ref: 0042C3D9
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409A7C,00000068), ref: 0042C401
              • __vbaFreeObj.MSVBVM60 ref: 0042C406
              • #585.MSVBVM60(00000000,00000000), ref: 0042C40E
              • __vbaFpR8.MSVBVM60 ref: 0042C414
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042C43D
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,0000004C), ref: 0042C462
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409994,0000001C), ref: 0042C4AA
              • __vbaObjSet.MSVBVM60(?,?), ref: 0042C4BF
              • __vbaFreeObj.MSVBVM60 ref: 0042C4C8
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042C4E1
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042C4FA
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098C8,00000098), ref: 0042C521
              • __vbaFreeObj.MSVBVM60 ref: 0042C52C
              • __vbaFreeObj.MSVBVM60(0042C56A), ref: 0042C55A
              • __vbaFreeStr.MSVBVM60 ref: 0042C563
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$New2$#585#648Copy
              • String ID:
              • API String ID: 2998728405-0
              • Opcode ID: 22ca745c71eeb2b881b69787a2264ca01f5092ac47257d3e70715be1154ca94c
              • Instruction ID: 9676ccd656221aecd72159040b865acda7233f3cda480d56fa041aac84f7c0e9
              • Opcode Fuzzy Hash: 22ca745c71eeb2b881b69787a2264ca01f5092ac47257d3e70715be1154ca94c
              • Instruction Fuzzy Hash: 40614070A40214EFCB14EFA5DD88EEEBBB8FF58300B10842AE545B72A1D7785945CF69
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 00424CD2
              • __vbaStrCopy.MSVBVM60 ref: 00424CDA
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 00424CEE
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000014), ref: 00424D13
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409A7C,000000F8), ref: 00424D3D
              • __vbaStrMove.MSVBVM60 ref: 00424D4C
              • __vbaFreeObj.MSVBVM60 ref: 00424D55
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00424D6E
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00424D87
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 00424DCF
              • __vbaFreeObj.MSVBVM60 ref: 00424DD8
              • __vbaFreeStr.MSVBVM60(00424E0E), ref: 00424E01
              • __vbaFreeStr.MSVBVM60 ref: 00424E06
              • __vbaFreeStr.MSVBVM60 ref: 00424E0B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$CopyNew2$Move
              • String ID: tonto
              • API String ID: 438941495-2099408982
              • Opcode ID: 5217c4bdb4338c9f955b274f7fc716ad470978e43ff85793b45d7061401d4d47
              • Instruction ID: 55359be3be6b8e803d96e707b11de992b12b97a4944fe4b2401044cb0a14b12d
              • Opcode Fuzzy Hash: 5217c4bdb4338c9f955b274f7fc716ad470978e43ff85793b45d7061401d4d47
              • Instruction Fuzzy Hash: 66414071A402199BCB04DF94DD88EEEBBB8FF58310F24406AE505B72A0D6749946CFA8
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • #582.MSVBVM60(00000000,00000000), ref: 0042C5E5
              • __vbaFpR8.MSVBVM60 ref: 0042C5EB
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042C615
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042C634
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,00000170), ref: 0042C657
              • _adj_fdiv_m64.MSVBVM60 ref: 0042C682
              • __vbaFpI4.MSVBVM60(43680000,?,42AA0000), ref: 0042C6AB
              • __vbaHresultCheckObj.MSVBVM60(00000000,00401648,004095E0,000002C0,?,42AA0000), ref: 0042C6E4
              • __vbaFreeObj.MSVBVM60(?,42AA0000), ref: 0042C6ED
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042C710
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042C729
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042C740
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042C759
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,000000A0), ref: 0042C77C
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 0042C7C1
              • __vbaFreeStr.MSVBVM60 ref: 0042C7CA
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0042C7DA
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckHresult$FreeNew2$#582List_adj_fdiv_m64
              • String ID:
              • API String ID: 25449687-0
              • Opcode ID: d32d748b53c073754340d1078c4bbdc3154bd3002759f355d0aa047c84dadca7
              • Instruction ID: fb38c3a175f24e2632e1c2ed2341aabfcd3b76836387b09b199066fb8c7a76cd
              • Opcode Fuzzy Hash: d32d748b53c073754340d1078c4bbdc3154bd3002759f355d0aa047c84dadca7
              • Instruction Fuzzy Hash: C5618170A00215EFD7109FA4DD88FAE7BB8FF48704F60452AF582B72A1D7789846CB58
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042BD42
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042BD5B
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 0042BDA9
              • __vbaFreeObj.MSVBVM60 ref: 0042BDB6
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042BDCE
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000014), ref: 0042BDF3
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409A7C,00000118), ref: 0042BE19
              • __vbaI2I4.MSVBVM60 ref: 0042BE1E
              • __vbaFreeObj.MSVBVM60 ref: 0042BE27
              • #714.MSVBVM60(?,?,00000000), ref: 0042BE4B
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 0042BE67
              • __vbaFreeVarList.MSVBVM60(00000002,00000005,?), ref: 0042BE7A
              • __vbaHresultCheckObj.MSVBVM60(00000000,004015F8,004095E0,00000254), ref: 0042BEAB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckHresult$Free$New2$#714List
              • String ID: carpeted
              • API String ID: 1235898942-2766835323
              • Opcode ID: 7d739858955d139dd4a87985c9a61684394b548bb457fff63962ac4439ee48cc
              • Instruction ID: 3c0ac12688a538c942c2c274a0d41e2aedec4cff09574dc8e3d15c097ce95fcb
              • Opcode Fuzzy Hash: 7d739858955d139dd4a87985c9a61684394b548bb457fff63962ac4439ee48cc
              • Instruction Fuzzy Hash: 75515E71A00214AFCB14DFA5DD89EDEBBF8EF48704F20442AE545BB2A1C7745945CFA8
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 00424A8C
              • __vbaStrCopy.MSVBVM60 ref: 00424A94
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 00424AA8
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000014), ref: 00424ACD
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409A7C,00000078), ref: 00424AF1
              • __vbaFreeObj.MSVBVM60 ref: 00424AFA
              • __vbaI4Str.MSVBVM60(00409AFC), ref: 00424B05
              • #608.MSVBVM60(?,00000000), ref: 00424B10
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 00424B2C
              • __vbaFreeVar.MSVBVM60 ref: 00424B37
              • #531.MSVBVM60(Barskabene8), ref: 00424B47
              • __vbaFreeStr.MSVBVM60(00424B82), ref: 00424B7A
              • __vbaFreeStr.MSVBVM60 ref: 00424B7F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckCopyHresult$#531#608New2
              • String ID: Barskabene8
              • API String ID: 2409260331-4041090310
              • Opcode ID: 16cd285cfd341211ee824fbd38e900ee1f863bc2f3de95babac7042dcdc2a990
              • Instruction ID: 60e4142825ba30a3d9ae12e8b862b467bacf902e897faee41db2e784573b17d3
              • Opcode Fuzzy Hash: 16cd285cfd341211ee824fbd38e900ee1f863bc2f3de95babac7042dcdc2a990
              • Instruction Fuzzy Hash: 03312F71D40229ABCB04DF94EE49DEEBBB8FF58700F10412AE501B72A4D7786945CBA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00424817
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00424836
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001D8), ref: 00424859
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00424872
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042488B
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409AE8,00000178), ref: 00424918
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00424928
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00424944
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042495D
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001FC), ref: 0042499D
              • __vbaFreeObj.MSVBVM60 ref: 004249AC
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 004249C1
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 004249DA
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,000001C4), ref: 004249FD
              • __vbaFreeObj.MSVBVM60 ref: 00424A06
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckHresultNew2$Free$List
              • String ID:
              • API String ID: 191279167-0
              • Opcode ID: f434106a84bc1868dc0456c608dee49db77b063845e3964e2cebe5aa2a93c3c1
              • Instruction ID: e3309b57b821bd3151292ee1f491d7f4005648c70aabdc8ec5863b037597d45f
              • Opcode Fuzzy Hash: f434106a84bc1868dc0456c608dee49db77b063845e3964e2cebe5aa2a93c3c1
              • Instruction Fuzzy Hash: DA6161B0A002059FC710EFA8D988F9ABBF8EF4C704F60847AE545F7361D6349846CB99
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • #526.MSVBVM60(?,00000001), ref: 00423636
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 00423652
              • __vbaFreeVar.MSVBVM60 ref: 00423664
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00423682
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042369B
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,00000050), ref: 004236BC
              • #667.MSVBVM60(?), ref: 004236D6
              • __vbaStrMove.MSVBVM60 ref: 004236E1
              • __vbaFreeObj.MSVBVM60 ref: 004236EA
              • __vbaFreeVar.MSVBVM60 ref: 004236F3
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00423708
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423721
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,00000158), ref: 00423748
              • __vbaFreeObj.MSVBVM60 ref: 00423757
              • __vbaFreeStr.MSVBVM60(00423794), ref: 0042378D
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresultNew2$#526#667Move
              • String ID:
              • API String ID: 1956310804-0
              • Opcode ID: c9bb0f80bba9fedaf13ae4dd70f4ba910e77034accea0960c2abe0352c932ed1
              • Instruction ID: 8228726e8cfd381dfe3d782d7af7da4898919f8cd44819d6e2e338182496acb0
              • Opcode Fuzzy Hash: c9bb0f80bba9fedaf13ae4dd70f4ba910e77034accea0960c2abe0352c932ed1
              • Instruction Fuzzy Hash: B5416370900215DFCB10DF94DE88EEEB7B8FF48705F10402AE542B7260DB785545CB58
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • #517.MSVBVM60(004099E0), ref: 0042AFD7
              • __vbaStrMove.MSVBVM60 ref: 0042AFE2
              • __vbaStrCmp.MSVBVM60(004099E8,00000000), ref: 0042AFEE
              • __vbaFreeStr.MSVBVM60 ref: 0042B001
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042B023
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042B03C
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,000001B8), ref: 0042B063
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042B07B
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000038,?,?,?,?,?), ref: 0042B0E7
              • __vbaVar2Vec.MSVBVM60(?,?,?,?,?,?,?), ref: 0042B0F5
              • __vbaAryMove.MSVBVM60(?,?,?,?,?,?,?), ref: 0042B103
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?), ref: 0042B10C
              • __vbaFreeVarList.MSVBVM60(00000002,?,?,?,?,?,?,?), ref: 0042B11C
              • __vbaAryDestruct.MSVBVM60(00000000,?,0042B179), ref: 0042B172
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresultMoveNew2$#517DestructListVar2
              • String ID:
              • API String ID: 4173891514-0
              • Opcode ID: 3e01a7ff9cd4993cb1f11166d4494df89b5c4ce4794bc489f1fc571ef0242f20
              • Instruction ID: fd856919aea96aa9ae838c0992edff77b95bbc361149ecb321eb706398e8ad4c
              • Opcode Fuzzy Hash: 3e01a7ff9cd4993cb1f11166d4494df89b5c4ce4794bc489f1fc571ef0242f20
              • Instruction Fuzzy Hash: 6E513E70E00218AFCB10DFA5D989ADEBBF8FF48700F10812AE545B7261D7745946CF98
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BF75
              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BF7D
              • __vbaNew2.MSVBVM60(00409924,0042D33C), ref: 0042BF91
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000014), ref: 0042BFBC
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409A7C,00000060), ref: 0042BFE4
              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BFEF
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BFF8
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042C011
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042C02A
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,0000020C), ref: 0042C04D
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042C052
              • __vbaFreeStr.MSVBVM60(0042C08F), ref: 0042C082
              • __vbaFreeStr.MSVBVM60 ref: 0042C087
              • __vbaFreeStr.MSVBVM60 ref: 0042C08C
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresult$CopyNew2$Move
              • String ID:
              • API String ID: 438941495-0
              • Opcode ID: 5285b40c3250f1cdb9944caece7a9cfb34b2abc51afc5825b0179570d13e7d03
              • Instruction ID: 87028fce92ec3fa3ba679e96a1cd2ddb550758573f60db62d71bd7117c49f0a8
              • Opcode Fuzzy Hash: 5285b40c3250f1cdb9944caece7a9cfb34b2abc51afc5825b0179570d13e7d03
              • Instruction Fuzzy Hash: E0412B71E002199BCB10DFA5DD88DEEBBB8EF5C704B244426E501B72A1D7789946CFA8
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaVarDup.MSVBVM60 ref: 0042A68F
              • #528.MSVBVM60(?,?), ref: 0042A69D
              • __vbaVarTstNe.MSVBVM60(?,?), ref: 0042A6B9
              • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0042A6CC
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042A6F1
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042A710
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,00000150), ref: 0042A733
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042A74C
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042A765
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001A0), ref: 0042A788
              • __vbaFpI4.MSVBVM60 ref: 0042A799
              • __vbaHresultCheckObj.MSVBVM60(00000000,00401508,004095E0,000002C8), ref: 0042A7E5
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0042A7F5
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckHresult$FreeListNew2$#528
              • String ID:
              • API String ID: 2869566290-0
              • Opcode ID: 5458f07abe9c2429ad2c07be9088884a131a211d4ad380e3db0b57d2d82738f5
              • Instruction ID: 57c5e18c5adafa0e89ca3d91da866300865e3309eb8d6146b0402d712ba498e2
              • Opcode Fuzzy Hash: 5458f07abe9c2429ad2c07be9088884a131a211d4ad380e3db0b57d2d82738f5
              • Instruction Fuzzy Hash: B05149B1A00208AFDB10DF95D948EDEBBB8FF88700F20452AF545B72A1D7745A45CF69
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 0042B522
              • #610.MSVBVM60(?), ref: 0042B52C
              • #552.MSVBVM60(?,?,00000001), ref: 0042B53C
              • __vbaVarMove.MSVBVM60 ref: 0042B548
              • __vbaFreeVar.MSVBVM60 ref: 0042B551
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042B56A
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042B583
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,00000078), ref: 0042B5A4
              • __vbaFreeObj.MSVBVM60 ref: 0042B5B3
              • __vbaFreeVar.MSVBVM60(0042B5F1), ref: 0042B5E1
              • __vbaFreeStr.MSVBVM60 ref: 0042B5EA
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$#552#610CheckCopyHresultMoveNew2
              • String ID:
              • API String ID: 3736399677-0
              • Opcode ID: 5dd55810ae2ef37d0ab3545c98c22a02add8fd0735ab66f06181445cdbfd4217
              • Instruction ID: d8dcacf36cd006151fefa240b8000f9cef7ddb819a6ab1b45a600580af9b47ad
              • Opcode Fuzzy Hash: 5dd55810ae2ef37d0ab3545c98c22a02add8fd0735ab66f06181445cdbfd4217
              • Instruction Fuzzy Hash: 90310770D00259EBCB00DFA4D988EDEBBB8FF58704F10452AE502B7260DB749946CB98
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$#529#563Copy
              • String ID: Oprevet
              • API String ID: 1811884707-3027852692
              • Opcode ID: 92d0f65181c6a1e7a366000068deac00918ca0560e8a419abe6ef1e04a9fa0a3
              • Instruction ID: 9b6542e37c1e9da65828dd0b23eb7ee43cd96f4b9f0c7eec03bd332865f6cc5f
              • Opcode Fuzzy Hash: 92d0f65181c6a1e7a366000068deac00918ca0560e8a419abe6ef1e04a9fa0a3
              • Instruction Fuzzy Hash: 41112975D012499BCB04DFA4DA85ADEBBF4EF48700F60452AE402B7250DB746E08CF65
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 0042B88D
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042B8A6
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042B8C5
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042B8E1
              • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042B8FA
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,00000158), ref: 0042B91D
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 0042B95D
              • __vbaFreeStr.MSVBVM60 ref: 0042B966
              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0042B976
              • __vbaFreeStr.MSVBVM60(0042B9BC), ref: 0042B9B5
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$CheckHresultNew2$CopyList
              • String ID:
              • API String ID: 4130517723-0
              • Opcode ID: 251bec8be01291e7fd97d4966f189f062db4f962327660629e626027532c21b6
              • Instruction ID: 54b2da29e0a1ca01dfa30365270ffaccce4885c37bd5eeb201aa079f469ddffb
              • Opcode Fuzzy Hash: 251bec8be01291e7fd97d4966f189f062db4f962327660629e626027532c21b6
              • Instruction Fuzzy Hash: C5413EB0A00214AFCB00DFA4DD89F9E7BB8FB4C700F60452AF545B7261D7799946CBA8
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BC07
              • __vbaNew2.MSVBVM60(004089D4,0042D010,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BC20
              • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BC39
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098C8,000001B0), ref: 0042BC7C
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BC85
              • #586.MSVBVM60(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BC8D
              • __vbaFpR8.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BC93
              • #569.MSVBVM60(00000047,?,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BCA8
              • __vbaFreeStr.MSVBVM60(0042BCCA,?,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042BCC3
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$#569#586CheckCopyHresultNew2
              • String ID:
              • API String ID: 3854721184-0
              • Opcode ID: 1ca4fba7bee375458b3a3bd177dcb13195c9b55650f3aa7e29e63b14974b665d
              • Instruction ID: 23c166fdb9a90ae8d839556ddcc1668d99d108c8a54f42adc16f856ae9e85769
              • Opcode Fuzzy Hash: 1ca4fba7bee375458b3a3bd177dcb13195c9b55650f3aa7e29e63b14974b665d
              • Instruction Fuzzy Hash: 8F218270A40204DBCB04DFA5DE89FAA7BB4FF48700F10852AF545BB2A0CB385801CBA9
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042A8B6
              • __vbaNew2.MSVBVM60(00409924,0042D33C,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042A8CE
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000014), ref: 0042A8F3
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409A7C,00000068), ref: 0042A917
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042A920
              • __vbaFreeStr.MSVBVM60(0042A941,?,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042A93A
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckFreeHresult$CopyNew2
              • String ID:
              • API String ID: 3978771648-0
              • Opcode ID: 9c15d1fbf022055924717e5f40043210a85bc9d35a22f15357500e9cb525bc8b
              • Instruction ID: 807e90aba424f8d9916d54827e0b487c5fa419bfa5e6550a1fdd1c8d8f3027b5
              • Opcode Fuzzy Hash: 9c15d1fbf022055924717e5f40043210a85bc9d35a22f15357500e9cb525bc8b
              • Instruction Fuzzy Hash: CF218070A00215AFCB04EF95DD48EAEBBB8FF58700B50442AE801B32A0D7785946CFA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00424BE3
              • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 00424BFC
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,000001EC), ref: 00424C44
              • __vbaFreeObj.MSVBVM60 ref: 00424C4D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckFreeHresultNew2
              • String ID: ECTORETINA
              • API String ID: 1645334062-2591629326
              • Opcode ID: 894dd1a5e4af5d4d11907b7f7d936b6dc017548029b5cc36359c35e4c051a1ab
              • Instruction ID: f948cdbdc9e3eac076e56cf776dcc7e4552cddffc375d0564e03987ea6297d59
              • Opcode Fuzzy Hash: 894dd1a5e4af5d4d11907b7f7d936b6dc017548029b5cc36359c35e4c051a1ab
              • Instruction Fuzzy Hash: 0C118470A00305ABC704DFA9DE49F9A7BB8FB48700F604529E545F7690D73899058B99
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • #535.MSVBVM60(?,?,?,?,?,?,?,?,?,00401666), ref: 00424261
              • __vbaNew2.MSVBVM60(004089D4,0042D010,?,?,?,?,?,?,?,?,?,00401666), ref: 0042427C
              • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,00401666), ref: 00424295
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,000000D8,?,?,?,?,?,?,?,?,?,00401666), ref: 004242BC
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,00401666), ref: 004242CB
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$#535CheckFreeHresultNew2
              • String ID:
              • API String ID: 1576155240-0
              • Opcode ID: 36644edfec21deefecc3e9d243ad45f73d69c2e0050d965f63af84be1a549b56
              • Instruction ID: 8194637e2c3272895ba1ca69e11d3dba1e4de73c54a107feeae017d8f3c53660
              • Opcode Fuzzy Hash: 36644edfec21deefecc3e9d243ad45f73d69c2e0050d965f63af84be1a549b56
              • Instruction Fuzzy Hash: AE118F74A40215EBCB10DF95DE49FAEBBB8FB88B00F604466F441B32A0DB785506CB79
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaNew2.MSVBVM60(00409924,0042D33C,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042B7BF
              • __vbaHresultCheckObj.MSVBVM60(00000000,029DEDCC,00409914,00000014,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042B7E4
              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00409A7C,00000140,?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042B80E
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,00401666), ref: 0042B817
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckHresult$FreeNew2
              • String ID:
              • API String ID: 4261391273-0
              • Opcode ID: d4008906016463c28c51238b756ac95e6ce2b820f0c27ccb22d55527df9ee822
              • Instruction ID: c52b1af457283d8aa73477b89a612a297d5cd9d0bed0cb1ce3b457dcab0e04ca
              • Opcode Fuzzy Hash: d4008906016463c28c51238b756ac95e6ce2b820f0c27ccb22d55527df9ee822
              • Instruction Fuzzy Hash: 70117270E40214ABCB00EF95DD49EAABBB8FF88704F54402AF405A72A1D7785545CBA4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 00429703
              • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 0042971C
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098F4,000001C8), ref: 0042975F
              • __vbaFreeObj.MSVBVM60 ref: 00429768
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckFreeHresultNew2
              • String ID:
              • API String ID: 1645334062-0
              • Opcode ID: 79787c4335697ab1793763ae137bf8f3393222af4237b6fa95df771be8997dfc
              • Instruction ID: 2f2a64263a4284c691ea084fecb88cb12195c954e544dd7237d22dede56bb0cf
              • Opcode Fuzzy Hash: 79787c4335697ab1793763ae137bf8f3393222af4237b6fa95df771be8997dfc
              • Instruction Fuzzy Hash: FD116370A40205EFD710DFA8DA49F9ABBB8FB48704F60452AF145E72A0D7389805CB99
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 17%
              			E00423080(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
              				char _v8;
              				intOrPtr _v12;
              				intOrPtr _v16;
              				char _v28;
              				intOrPtr* _t12;
              				intOrPtr* _t14;
              				intOrPtr* _t16;
              				void* _t17;
              				intOrPtr* _t26;
              				void* _t27;
              				void* _t29;
              				intOrPtr _t30;
              
              				_t30 = _t29 - 0xc;
              				 *[fs:0x0] = _t30;
              				_v16 = _t30 - 0x14;
              				_v12 = 0x401200;
              				_v8 = 0;
              				_t12 = _a4;
              				 *((intOrPtr*)( *_t12 + 4))(_t12, __edi, __esi, __ebx,  *[fs:0x0], 0x401666, _t27);
              				_t14 =  *0x42d010; // 0x7bfa70
              				_v28 = 0;
              				if(_t14 == 0) {
              					__imp____vbaNew2(0x4089d4, 0x42d010);
              					_t14 =  *0x42d010; // 0x7bfa70
              				}
              				_t16 =  &_v28;
              				__imp____vbaObjSet(_t16,  *((intOrPtr*)( *_t14 + 0x314))(_t14));
              				_t26 = _t16;
              				_t17 =  *((intOrPtr*)( *_t26 + 0x20c))(_t26);
              				asm("fclex");
              				if(_t17 < 0) {
              					__imp____vbaHresultCheckObj(_t17, _t26, 0x4098d8, 0x20c);
              				}
              				__imp____vbaFreeObj();
              				_push(0x42312a);
              				return _t17;
              			}















              0x00423083
              0x00423092
              0x0042309f
              0x004230a2
              0x004230ab
              0x004230ae
              0x004230b4
              0x004230b7
              0x004230be
              0x004230c1
              0x004230cd
              0x004230d3
              0x004230d3
              0x004230e2
              0x004230e6
              0x004230ec
              0x004230f1
              0x004230f7
              0x004230fb
              0x00423109
              0x00423109
              0x00423112
              0x00423118
              0x00000000

              APIs
              • __vbaNew2.MSVBVM60(004089D4,0042D010,?,?,?,?,?,?,?,00401666), ref: 004230CD
              • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,00401666), ref: 004230E6
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004098D8,0000020C,?,?,?,?,?,?,?,00401666), ref: 00423109
              • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,00401666), ref: 00423112
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckFreeHresultNew2
              • String ID:
              • API String ID: 1645334062-0
              • Opcode ID: a2c371175675b3e944a94dbc98e0d63fbe95d913a59efa9e8d6cc524910f9873
              • Instruction ID: 061b2664c6080dacace045f8579bf7c14ef690c7d1f31242d13dc28d4563ff08
              • Opcode Fuzzy Hash: a2c371175675b3e944a94dbc98e0d63fbe95d913a59efa9e8d6cc524910f9873
              • Instruction Fuzzy Hash: 20118270A40214EBC710EFA4DD4DF9ABBB8FF48701F604566F441E36A1C67895468BA8
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042A9A3
              • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 0042A9BC
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409AE8,00000180), ref: 0042A9DF
              • __vbaFreeObj.MSVBVM60 ref: 0042A9E8
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckFreeHresultNew2
              • String ID:
              • API String ID: 1645334062-0
              • Opcode ID: 4cd351514d30655ad9336c1c2e38133f6eaed24b7d4cdbf05a1e71a4df54ed04
              • Instruction ID: 41a231ef2ddbafca82ee11e553ec7afff37680de0b60e89b3ad3d92853cc8b90
              • Opcode Fuzzy Hash: 4cd351514d30655ad9336c1c2e38133f6eaed24b7d4cdbf05a1e71a4df54ed04
              • Instruction Fuzzy Hash: 1A018E74A40204AFC7109FA5DE49F9B7BB8AB08B05F504426F841B72A0D7785505CBA9
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __vbaNew2.MSVBVM60(004089D4,0042D010), ref: 0042B663
              • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 0042B67C
              • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00409A10,00000218), ref: 0042B69F
              • __vbaFreeObj.MSVBVM60 ref: 0042B6A8
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$CheckFreeHresultNew2
              • String ID:
              • API String ID: 1645334062-0
              • Opcode ID: ef1746344966962acad85306d1ac1a86d2ee6f06cc96b506d9e0b48a7ac8b710
              • Instruction ID: 30d6ef91059611946878f575f639c718c5a7eac44910c71ae605f343571dae38
              • Opcode Fuzzy Hash: ef1746344966962acad85306d1ac1a86d2ee6f06cc96b506d9e0b48a7ac8b710
              • Instruction Fuzzy Hash: 3D015274A40214AFC710DFA4DE4DF9A7BB8EB08B05F600526F441F71B1D77899458BAA
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • #704.MSVBVM60(?,000000FF,000000FE,000000FE,000000FE), ref: 0042B724
              • __vbaStrMove.MSVBVM60 ref: 0042B72F
              • __vbaFreeVar.MSVBVM60 ref: 0042B738
              • __vbaFreeStr.MSVBVM60(0042B759), ref: 0042B752
              Memory Dump Source
              • Source File: 00000000.00000002.465303046.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.465266053.0000000000400000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465572694.000000000042D000.00000004.00020000.sdmp Download File
              • Associated: 00000000.00000002.465602453.000000000042F000.00000002.00020000.sdmp Download File
              • Associated: 00000000.00000002.465787257.0000000000462000.00000002.00020000.sdmp Download File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Invoice-NBM01557.jbxd
              Yara matches
              Similarity
              • API ID: __vba$Free$#704Move
              • String ID:
              • API String ID: 3473371104-0
              • Opcode ID: 3e1adacb0461ca6b7aa97375eaa204849ed213992005ab79e0c93b31538bdc1b
              • Instruction ID: 0c8606013d4f4d4be749ad83a84589ab835fb6eb3a5ff28ece10a6118d154626
              • Opcode Fuzzy Hash: 3e1adacb0461ca6b7aa97375eaa204849ed213992005ab79e0c93b31538bdc1b
              • Instruction Fuzzy Hash: 6AF03670900158AFCB00DFA8DE45EADBBB8EB49721F304325E516B21E0D7341A04CB55
              Uniqueness

              Uniqueness Score: -1.00%

              Execution Graph

              Execution Coverage:1.9%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:60.8%
              Total number of Nodes:265
              Total number of Limit Nodes:13

              Graph

              execution_graph 51913 f010f8 51914 f010fe 51913->51914 51928 f010f1 51914->51928 51916 f01103 EnumWindows 51918 f012ca 51916->51918 51924 f01131 51916->51924 51943 f0e9fe 51918->51943 51923 f0e9fe 3 API calls 51925 f01352 51923->51925 51926 f0e9fe 3 API calls 51925->51926 51927 f01525 51926->51927 51929 f010f2 51928->51929 51930 f010f1 6 API calls 51929->51930 51931 f01103 EnumWindows 51930->51931 51933 f012ca 51931->51933 51939 f01131 51931->51939 51934 f0e9fe 3 API calls 51933->51934 51935 f012d9 51934->51935 51936 f09db1 6 API calls 51935->51936 51937 f012f0 51936->51937 51938 f0e9fe 3 API calls 51937->51938 51940 f01352 51938->51940 51939->51916 51941 f0e9fe 3 API calls 51940->51941 51942 f01525 51941->51942 51942->51916 51945 f0ea56 51943->51945 51944 f0eb83 LoadLibraryA 51962 f0eba8 51944->51962 51945->51944 51980 f0f090 GetPEB 51945->51980 51948 f012d9 51956 f09db1 51948->51956 51949 f0eaf9 51950 f0eb1f 51949->51950 51951 f0f090 GetPEB 51949->51951 51952 f0eba8 2 API calls 51950->51952 51953 f0eb10 51951->51953 51954 f0eb7d 51952->51954 51953->51950 51955 f0f090 GetPEB 51953->51955 51954->51944 51954->51948 51955->51950 51957 f09e07 51956->51957 51958 f0e9fe 3 API calls 51957->51958 51959 f09e0f 51958->51959 51982 f09e1e 51959->51982 51961 f012f0 51961->51923 51963 f0ebf6 51962->51963 51963->51948 51964 f0f090 GetPEB 51963->51964 51965 f01242 51963->51965 51966 f0f9a2 51963->51966 51964->51966 51965->51948 51966->51965 51967 f0f090 GetPEB 51966->51967 51979 f0e9fe 51966->51979 51967->51979 51968 f0eb83 LoadLibraryA 51969 f0eba8 GetPEB 51968->51969 51970 f0eb8c 51969->51970 51970->51948 51971 f0f090 GetPEB 51972 f0eaf9 51971->51972 51973 f0eb1f 51972->51973 51974 f0f090 GetPEB 51972->51974 51975 f0eba8 GetPEB 51973->51975 51976 f0eb10 51974->51976 51977 f0eb7d 51975->51977 51976->51973 51978 f0f090 GetPEB 51976->51978 51977->51968 51977->51970 51978->51973 51979->51948 51979->51965 51979->51968 51979->51971 51981 f0f099 51980->51981 51981->51949 51983 f09e4b 51982->51983 51984 f09eb9 51983->51984 52006 f095e7 CreateFileA 51983->52006 51986 f09ec2 51984->51986 51987 f0f948 51984->51987 52007 f01242 LoadLibraryA CreateFileA LoadLibraryA GetPEB 51986->52007 51989 f0f090 GetPEB 51987->51989 51992 f0f9a2 51989->51992 51990 f0a21d 51990->51961 51991 f01242 51991->51961 51992->51991 51993 f0f090 GetPEB 51992->51993 52005 f0e9fe 51992->52005 51993->52005 51994 f0eb83 LoadLibraryA 51995 f0eba8 2 API calls 51994->51995 51997 f0eb8c 51995->51997 51996 f0f090 GetPEB 51998 f0eaf9 51996->51998 51997->51961 51999 f0eb1f 51998->51999 52000 f0f090 GetPEB 51998->52000 52001 f0eba8 2 API calls 51999->52001 52002 f0eb10 52000->52002 52003 f0eb7d 52001->52003 52002->51999 52004 f0f090 GetPEB 52002->52004 52003->51994 52003->51997 52004->51999 52005->51961 52005->51991 52005->51994 52005->51996 52006->51984 52007->51990 52105 f0b6d7 52106 f0b60f 52105->52106 52111 f0b67a 52105->52111 52107 f0b5d2 InternetOpenUrlA 52106->52107 52109 f0b622 52106->52109 52106->52111 52107->52111 52110 f0b661 InternetOpenUrlA 52109->52110 52109->52111 52110->52111 52201 f01242 LoadLibraryA GetPEB LoadLibraryA 52123 f012c5 6 API calls 52211 f01242 LoadLibraryA LoadLibraryA GetPEB LoadLibraryA GetPEB 52215 f01242 8 API calls 52044 f0a093 52045 f0a046 52044->52045 52046 f0a204 CreateFileA 52045->52046 52047 f095e7 52045->52047 52228 f01242 LoadLibraryA LoadLibraryA GetPEB 52146 f01c8f 52149 f01aea 52146->52149 52147 f0f948 52148 f0f090 GetPEB 52147->52148 52151 f0f9a2 52148->52151 52149->52147 52184 f095c2 GetPEB 52149->52184 52152 f01242 52151->52152 52172 f0f090 GetPEB 52151->52172 52182 f0e9fe 52151->52182 52153 f01e55 52155 f0e9fe 3 API calls 52153->52155 52180 f012ca 52153->52180 52154 f0e9fe 3 API calls 52156 f012d9 52154->52156 52160 f01e83 52155->52160 52157 f09db1 6 API calls 52156->52157 52158 f012f0 52157->52158 52159 f0e9fe 3 API calls 52158->52159 52162 f01352 52159->52162 52160->52152 52163 f0e9fe 3 API calls 52160->52163 52160->52180 52181 f02081 52160->52181 52161 f0e9fe 3 API calls 52164 f0264c 52161->52164 52166 f0e9fe 3 API calls 52162->52166 52163->52181 52165 f0e9fe 3 API calls 52164->52165 52167 f026d2 52165->52167 52183 f01525 52166->52183 52167->52147 52167->52180 52167->52182 52168 f0eb83 LoadLibraryA 52169 f0eba8 2 API calls 52168->52169 52171 f0eb8c 52169->52171 52170 f0f090 GetPEB 52173 f0eaf9 52170->52173 52172->52182 52174 f0eb1f 52173->52174 52175 f0f090 GetPEB 52173->52175 52176 f0eba8 2 API calls 52174->52176 52177 f0eb10 52175->52177 52178 f0eb7d 52176->52178 52177->52174 52179 f0f090 GetPEB 52177->52179 52178->52168 52178->52171 52179->52174 52180->52152 52180->52154 52181->52147 52181->52152 52181->52161 52181->52180 52181->52182 52182->52152 52182->52168 52182->52170 52185 f01242 52184->52185 52185->52153 52009 f00e61 8 API calls 52240 f012ca 8 API calls 52242 f01242 LoadLibraryA LoadLibraryA CreateFileA LoadLibraryA GetPEB 52048 f012ca 7 API calls 52248 f012ca 10 API calls 52113 f0c059 52116 f0ef35 52113->52116 52115 f0c05e LdrInitializeThunk 52117 f0ef41 52116->52117 52117->52115 52260 f012ca 7 API calls 52261 f06ed3 NtProtectVirtualMemory 52263 f0a210 LoadLibraryA CreateFileA LoadLibraryA GetPEB 52268 f0681e 6 API calls 52138 f1140d 52139 f11412 52138->52139 52140 f11471 52139->52140 52143 f113c0 52139->52143 52141 f1147a NtProtectVirtualMemory 52140->52141 52142 f06ed3 52140->52142 52143->52142 52144 f11479 NtProtectVirtualMemory 52143->52144 52273 f09e0c LoadLibraryA LoadLibraryA CreateFileA LoadLibraryA GetPEB 52010 f123e3 52011 f1231a 52010->52011 52012 f12351 52011->52012 52014 f123fe 52011->52014 52025 f122da 52011->52025 52013 f124b9 52015 f124d5 6 API calls 52013->52015 52014->52012 52014->52013 52017 f012ca 52014->52017 52020 f124ce 52014->52020 52016 f124d3 52015->52016 52018 f0e9fe 3 API calls 52017->52018 52027 f12613 52017->52027 52019 f012d9 52018->52019 52021 f09db1 6 API calls 52019->52021 52020->52016 52031 f124d5 52020->52031 52023 f012f0 52021->52023 52026 f0e9fe 3 API calls 52023->52026 52024 f12349 InternetOpenA 52024->52012 52025->52012 52025->52024 52028 f01352 52026->52028 52029 f0e9fe 3 API calls 52028->52029 52030 f01525 52029->52030 52032 f012ca 52031->52032 52033 f0e9fe 3 API calls 52032->52033 52038 f12613 52032->52038 52034 f012d9 52033->52034 52035 f09db1 6 API calls 52034->52035 52036 f012f0 52035->52036 52037 f0e9fe 3 API calls 52036->52037 52039 f01352 52037->52039 52038->52016 52040 f0e9fe 3 API calls 52039->52040 52041 f01525 52040->52041 52041->52016 52281 f0e9e3 GetPEB 52104 f013d6 LoadLibraryA LoadLibraryA GetPEB 52292 f01242 LoadLibraryA LoadLibraryA GetPEB LoadLibraryA 52296 f00fce LoadLibraryA LoadLibraryA GetPEB 52299 f012ca 9 API calls 52300 f01242 LoadLibraryA LoadLibraryA LoadLibraryA GetPEB 52301 f0afaa InternetOpenUrlA 52124 f0a785 52125 f012ca 52124->52125 52129 f0a7a4 52124->52129 52126 f0e9fe 3 API calls 52125->52126 52127 f012d9 52126->52127 52128 f09db1 6 API calls 52127->52128 52130 f012f0 52128->52130 52129->52125 52131 f0a849 NtAllocateVirtualMemory 52129->52131 52132 f0e9fe 3 API calls 52130->52132 52133 f095e7 52131->52133 52134 f01352 52132->52134 52135 f0e9fe 3 API calls 52134->52135 52136 f01525 52135->52136 52312 f012ca 9 API calls 52334 f01242 7 API calls 52342 f06312 8 API calls 52049 f03116 52053 f03087 52049->52053 52052 f0328f Sleep 52052->52053 52053->52052 52054 f101b8 52053->52054 52068 f04f3b 52053->52068 52055 f0e9fe 52054->52055 52061 f01242 52054->52061 52055->52053 52056 f0eb83 LoadLibraryA 52055->52056 52058 f0f090 GetPEB 52055->52058 52055->52061 52057 f0eba8 2 API calls 52056->52057 52059 f0eb8c 52057->52059 52060 f0eaf9 52058->52060 52059->52053 52062 f0eb1f 52060->52062 52063 f0f090 GetPEB 52060->52063 52061->52053 52064 f0eba8 2 API calls 52062->52064 52065 f0eb10 52063->52065 52066 f0eb7d 52064->52066 52065->52062 52067 f0f090 GetPEB 52065->52067 52066->52056 52066->52059 52067->52062 52069 f04f3e 52068->52069 52070 f0e9fe 3 API calls 52069->52070 52071 f04f4e 52070->52071 52072 f05d4c GetPEB 52071->52072 52073 f0e9fe 52071->52073 52088 f05dac 52072->52088 52074 f0eb83 LoadLibraryA 52073->52074 52076 f0f090 GetPEB 52073->52076 52075 f0eba8 2 API calls 52074->52075 52077 f0eb8c 52075->52077 52078 f0eaf9 52076->52078 52077->52053 52081 f0f090 GetPEB 52078->52081 52086 f0eb1f 52078->52086 52080 f1246c 52083 f0eb10 52081->52083 52082 f0eba8 2 API calls 52084 f0eb7d 52082->52084 52085 f0f090 GetPEB 52083->52085 52083->52086 52084->52074 52084->52077 52085->52086 52086->52082 52087 f060e9 52103 f012ca 8 API calls 52087->52103 52088->52073 52088->52087 52089 f012ca 52088->52089 52093 f06711 52088->52093 52090 f0e9fe 3 API calls 52089->52090 52091 f012d9 52090->52091 52092 f09db1 6 API calls 52091->52092 52094 f012f0 52092->52094 52093->52087 52095 f06743 52093->52095 52096 f0e9fe 3 API calls 52094->52096 52095->52073 52097 f06835 52095->52097 52100 f01352 52096->52100 52098 f124d5 6 API calls 52097->52098 52099 f124d3 52098->52099 52101 f0e9fe 3 API calls 52100->52101 52102 f01525 52101->52102 52102->52053 52103->52080 52346 f02f1e 12 API calls

              Executed Functions

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: .d%$RL22$t/M$gq$h7$ij
              • API String ID: 0-4183542688
              • Opcode ID: 89f9151914855ad32854c4c2b26250c06b7ad77633cf5a672774328f4cc125e1
              • Instruction ID: a7233dfd8b139fce977039c381108f07424413660012d76ba4269ed464d54e94
              • Opcode Fuzzy Hash: 89f9151914855ad32854c4c2b26250c06b7ad77633cf5a672774328f4cc125e1
              • Instruction Fuzzy Hash: 27726C36918240CECF2DCF3858753C677A1FB92364F56416EC592CF066E6A648C7EE82
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: 8$9$D,Uq$o$vNE@
              • API String ID: 1029625771-3383889576
              • Opcode ID: 1e2831f77e129b4df8ebb8bf01a191dd67767bae425fcba9ab594b9bcc1860b3
              • Instruction ID: ad50b87accf113868423f9987f0740699df1332dba2684f26c101e69d28e1e80
              • Opcode Fuzzy Hash: 1e2831f77e129b4df8ebb8bf01a191dd67767bae425fcba9ab594b9bcc1860b3
              • Instruction Fuzzy Hash: 75E2D37A905201CECF3DCE79947538377A1FB90364B96857AC8428F5A1E2664C8BFEC1
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: L
              • API String ID: 0-1735490630
              • Opcode ID: 8fc625a7cc45aeb894b5630a97e2d910f0b6144c142dae51b32c4a886b7c3c2d
              • Instruction ID: ef175d8f5311bdc925209d3d37afadd1ab4d8b8660768df1dff5773d285a2a24
              • Opcode Fuzzy Hash: 8fc625a7cc45aeb894b5630a97e2d910f0b6144c142dae51b32c4a886b7c3c2d
              • Instruction Fuzzy Hash: 00C2E23A915100CECE6CCFB964753C277A1FB50368B96916AC552CF131E26A48E7FEC2
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: vNE@
              • API String ID: 0-4005984838
              • Opcode ID: 9a6bbbe692b060513959800bd96ee7b08ce0019a8b7999ffee186c1010d4dd03
              • Instruction ID: 241c952a6269e0978537b95635e8c5dd22e606140dec8a11f46e11a57b45c5f6
              • Opcode Fuzzy Hash: 9a6bbbe692b060513959800bd96ee7b08ce0019a8b7999ffee186c1010d4dd03
              • Instruction Fuzzy Hash: 2FA24C3A905201CFCF39CE7994753C337A1AF91364F96857ACC428F5A1E676488AFAC1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 2273 f04f3b-f050ed call f0e9fe call f0e911 2285 f05131-f05134 2273->2285 2286 f0513b-f05340 call f0e911 2273->2286 2285->2286 2295 f05345-f05496 call f0e911 2286->2295 2301 f0549c-f05500 2295->2301 2304 f05506-f056bf call f11a27 2301->2304 2312 f056c5-f056e9 2304->2312 2314 f056ec-f05761 2312->2314 2316 f05763-f05774 2314->2316 2317 f05776-f0582e call f0e911 2316->2317 2321 f05834-f05944 call f0e911 2317->2321 2326 f05d47-f05e5c call f0698e GetPEB 2321->2326 2327 f0594a-f059a2 2321->2327 2341 f05e62-f05ec2 2326->2341 2342 f062ec 2326->2342 2330 f059a8-f059ab 2327->2330 2331 f0e9fe-f0ea91 2327->2331 2333 f059ad-f05aea call f0e911 2330->2333 2346 f0eb83-f0eb8a LoadLibraryA call f0eba8 2331->2346 2347 f0ea97-f0eafc call f0f090 2331->2347 2360 f05af0-f05b04 2333->2360 2361 f05d44 2333->2361 2349 f05ec4-f06098 call f06bac 2341->2349 2345 f06310-f0631c 2342->2345 2352 f0636a-f1246c call f0637a 2345->2352 2355 f0eb8c-f0eb94 2346->2355 2363 f0eb73-f0eb7e call f0eba8 2347->2363 2364 f0eafe-f0eb13 call f0f090 2347->2364 2385 f060a0-f060ae 2349->2385 2386 f0609b call f11a27 2349->2386 2372 f12471 2352->2372 2366 f05b06-f05b09 2360->2366 2367 f05b0f-f05b15 2360->2367 2361->2326 2363->2355 2383 f0eb80 2363->2383 2364->2363 2379 f0eb15-f0eb71 call f0f090 2364->2379 2366->2367 2377 f05b17-f05b91 2367->2377 2372->2372 2387 f05d30-f05d3f 2377->2387 2388 f05b97-f05b9f 2377->2388 2379->2363 2383->2346 2385->2349 2389 f060b4 2385->2389 2386->2385 2387->2333 2391 f05ba1-f05bf2 2388->2391 2392 f05bf7-f05c34 call f0ee9b 2388->2392 2394 f06102-f06133 2389->2394 2395 f060dd-f060e7 2389->2395 2399 f05c8c-f05cd5 call f0ee9b 2391->2399 2392->2399 2403 f05cd7-f05d2b 2392->2403 2406 f06185-f061bb 2394->2406 2400 f06165-f06168 2395->2400 2401 f060e9-f06101 2395->2401 2399->2403 2407 f0611a-f06133 2400->2407 2408 f0616a-f0616c 2400->2408 2401->2394 2403->2377 2413 f061bd-f061e4 2406->2413 2407->2406 2408->2413 2414 f0616e-f06177 2408->2414 2420 f06236-f0627b 2413->2420 2416 f061f5-f061ff 2414->2416 2417 f06179-f06183 2414->2417 2418 f06201-f06217 2416->2418 2419 f0627d 2416->2419 2417->2406 2417->2418 2424 f06295-f0629f 2418->2424 2425 f06219-f06223 2418->2425 2421 f062cf-f062ea call f11a27 2419->2421 2420->2419 2421->2342 2427 f062a1-f062ab 2424->2427 2425->2427 2428 f06225-f0622f 2425->2428 2430 f062ad-f062c3 2427->2430 2429 f06231-f06234 2428->2429 2428->2430 2429->2420 2432 f06341-f0634b 2430->2432 2433 f062c5-f062c8 2430->2433 2434 f063c9-f063d0 2432->2434 2435 f0634d-f06357 2432->2435 2433->2421 2436 f063d5-f063d7 2434->2436 2435->2436 2437 f06359-f06363 2435->2437 2441 f06455-f0645f 2436->2441 2442 f063d9-f063dc 2436->2442 2439 f063e1-f063e3 2437->2439 2440 f06365-f06368 2437->2440 2443 f06461-f0646b 2439->2443 2444 f063e5-f06441 2439->2444 2440->2352 2441->2443 2445 f064dd-f064e7 2441->2445 2442->2439 2446 f064e9-f064f3 2443->2446 2447 f0646d-f06477 2443->2447 2458 f06493-f064c5 2444->2458 2445->2446 2448 f06565-f06652 2445->2448 2451 f064f5-f064ff 2446->2451 2447->2451 2452 f06479-f06483 2447->2452 2448->2331 2459 f06658-f0670b 2448->2459 2455 f06501-f0650b 2451->2455 2452->2455 2456 f06485-f0648f 2452->2456 2461 f0650d-f06520 2455->2461 2460 f06491-f06492 2456->2460 2456->2461 2458->2451 2467 f06513-f06520 2458->2467 2465 f06711-f0673d call f11a27 2459->2465 2466 f012ca-f0159a call f0e9fe call f09db1 call f0e9fe call f11a27 call f0e9fe 2459->2466 2460->2458 2464 f06522-f06533 2461->2464 2464->2466 2468 f06539-f0655f 2464->2468 2465->2345 2477 f06743-f0682f 2465->2477 2510 f0159d-f01831 call f0ef30 2466->2510 2467->2464 2468->2448 2477->2331 2483 f06835-f124d3 call f11a27 call f124d5 2477->2483 2521 f01836-f01838 2510->2521 2521->2510 2522 f0183e-f0c5c9 call f018e2 2521->2522
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: cE*
              • API String ID: 1029625771-336441071
              • Opcode ID: c8cb4e9f54044036e5d9fca3807698d19c8fca716a470ea9a962770429cd9fa4
              • Instruction ID: 5f7bc96d740dbdac417d82033220a7e05a3356f438dcd80fbfb47fcfb025f34e
              • Opcode Fuzzy Hash: c8cb4e9f54044036e5d9fca3807698d19c8fca716a470ea9a962770429cd9fa4
              • Instruction Fuzzy Hash: 0F42337270470ADFDB249E28CC94BEA77E2FF49750F94422EDC8987280D7749985EB81
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 2528 f0637a-f0638b 2529 f0638e-f06396 2528->2529 2529->2529 2530 f06398-f064c5 GetPEB 2529->2530 2537 f06513-f06520 2530->2537 2538 f064f5-f06520 2530->2538 2539 f06522-f06533 2537->2539 2538->2539 2542 f06539-f06652 2539->2542 2543 f012ca-f0159a call f0e9fe call f09db1 call f0e9fe call f11a27 call f0e9fe 2539->2543 2552 f06658-f0670b 2542->2552 2553 f0e9fe-f0ea91 2542->2553 2619 f0159d-f01838 call f0ef30 2543->2619 2552->2543 2558 f06711-f0673d call f11a27 2552->2558 2566 f0eb83-f0eb8a LoadLibraryA call f0eba8 2553->2566 2567 f0ea97-f0eafc call f0f090 2553->2567 2574 f06310-f1246c call f0637a 2558->2574 2575 f06743-f0682f 2558->2575 2573 f0eb8c-f0eb94 2566->2573 2581 f0eb73-f0eb7e call f0eba8 2567->2581 2582 f0eafe-f0eb13 call f0f090 2567->2582 2598 f12471 2574->2598 2575->2553 2588 f06835-f124d3 call f11a27 call f124d5 2575->2588 2581->2573 2601 f0eb80 2581->2601 2582->2581 2597 f0eb15-f0eb71 call f0f090 2582->2597 2597->2581 2598->2598 2601->2566 2632 f0183e-f0c5c9 call f018e2 2619->2632
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: .C1K
              • API String ID: 0-874949410
              • Opcode ID: fd2d7766f01572689930ae11584c83a5e5f15f36f794987ed4a115359d24ed84
              • Instruction ID: a8c531f9d072fa995196a0f7538c2541dd20ab19d46ba2b9fbf87dc7fb9bf196
              • Opcode Fuzzy Hash: fd2d7766f01572689930ae11584c83a5e5f15f36f794987ed4a115359d24ed84
              • Instruction Fuzzy Hash: 19E15871604306CFDB34AE748D953EA77E2AF553A0FA5412EDC8AC7185D335C985EB02
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: 8
              • API String ID: 1029625771-4194326291
              • Opcode ID: 513022e1870a1a273da3517098008717bc71adbf070ad540ea969feac05633ab
              • Instruction ID: efa15c41d749e12a1f1c637c15d5dd490a70482c8a1567ef3395960c8f3437e9
              • Opcode Fuzzy Hash: 513022e1870a1a273da3517098008717bc71adbf070ad540ea969feac05633ab
              • Instruction Fuzzy Hash: C34182BAA05100CECF7DCF7A507670377A2BBD0369B97497AC8038E0B0E5AA4D55B9C1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 88140a75ed9e88fff445944f6c66541951fb7c416ce189763a3bb94c429bd8b3
              • Instruction ID: a4d901a7ef40836a215a891357214bd995da928a74a18c1145e48acc3d10e0f2
              • Opcode Fuzzy Hash: 88140a75ed9e88fff445944f6c66541951fb7c416ce189763a3bb94c429bd8b3
              • Instruction Fuzzy Hash: C082F33A915600CECF2DCF79587638337A1FF91364B96856AC842CF0A1E6664897FEC1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 4861 f102a2-f102af 4863 f102b1-f102bb 4861->4863 4864 f1032d-f10337 4861->4864 4865 f10339-f10343 4863->4865 4866 f102bd-f102c7 4863->4866 4864->4865 4867 f103b5-f103bf 4864->4867 4868 f10345-f1034f 4865->4868 4870 f103c1-f103cb 4865->4870 4866->4868 4869 f102c9-f102d3 4866->4869 4867->4870 4871 f1043d-f10447 4867->4871 4873 f102d5-f102e1 4868->4873 4875 f10350-f1036c 4868->4875 4872 f10351-f1036c 4869->4872 4869->4873 4874 f10449-f1044e 4870->4874 4876 f103cd-f103d0 4870->4876 4871->4874 4878 f1036e-f1037d 4872->4878 4887 f102e3-f102f2 4873->4887 4880 f10454-f10468 4874->4880 4881 f0e9fe-f0ea91 4874->4881 4875->4878 4877 f103d1-f103d5 4876->4877 4885 f103d8-f103dc 4877->4885 4878->4885 4890 f1037f 4878->4890 4888 f01242-f012c2 call f01078 4880->4888 4889 f1046e-f10503 call f0e9fe * 2 GetPEB 4880->4889 4902 f0eb83-f0eb8a LoadLibraryA call f0eba8 4881->4902 4903 f0ea97-f0eafc call f0f090 4881->4903 4885->4878 4891 f103de-f103ea 4885->4891 4895 f102f4-f102f9 4887->4895 4896 f102fe-f10302 4887->4896 4918 f095e7-f095eb 4889->4918 4919 f10509-f105c4 call f1134c 4889->4919 4890->4877 4891->4888 4901 f103f0-f103f1 4891->4901 4895->4887 4896->4875 4909 f0eb8c-f0eb94 4902->4909 4915 f0eb73-f0eb7e call f0eba8 4903->4915 4916 f0eafe-f0eb13 call f0f090 4903->4916 4915->4909 4933 f0eb80 4915->4933 4916->4915 4929 f0eb15-f0eb71 call f0f090 4916->4929 4921 f095ec-f09670 4918->4921 4937 f10e5b 4919->4937 4938 f105ca-f10762 4919->4938 4930 f09676-f096ce 4921->4930 4929->4915 4933->4902 4938->4881 4947 f10768-f107fc 4938->4947 4947->4881 4949 f10802-f10967 4947->4949 4954 f1096b-f10971 4949->4954 4955 f10977-f1097c 4954->4955 4956 f10eae-f10ec6 4954->4956 4955->4954 4957 f1097e-f10984 4955->4957 4957->4954 4958 f10986-f10993 4957->4958 4958->4954 4959 f10995-f10a20 4958->4959 4961 f10a22-f10bfb 4959->4961 4966 f10c01-f10c05 4961->4966 4967 f10d05-f10d10 4961->4967 4966->4967 4970 f10c0b-f10ceb 4966->4970 4968 f10d16-f10d1f 4967->4968 4969 f10dbe-f10dc4 4967->4969 4968->4969 4971 f10d25-f10dbb 4968->4971 4969->4961 4972 f10dca-f10e56 call f1134c 4969->4972 4979 f10ced-f10cf1 4970->4979 4971->4969 4972->4937 4979->4979 4980 f10cf3-f10cf8 4979->4980 4980->4979 4981 f10cfa-f10d00 4980->4981 4981->4979 4982 f10d02-f10d04 4981->4982 4982->4967
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3d4985e49161acfefc199ea623b856790d1bc17accc6c950daffd07d82a999ef
              • Instruction ID: c01c469aab5fdc0d487f54c9078034c2e672ffd068e471da238aac9bff6f0708
              • Opcode Fuzzy Hash: 3d4985e49161acfefc199ea623b856790d1bc17accc6c950daffd07d82a999ef
              • Instruction Fuzzy Hash: CB026C216083428FDB258F3888A87D77BD25F53370F5982A9CC958B1D7D7B588C6E702
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 4983 f0afaa-f0b220 call f0a40d call f11a27 4995 f0b226-f0b42d call f0b2b1 call f11a27 4983->4995 4996 f0ba1e-f0ba9d call f11a27 4983->4996 4995->4996 5012 f0b433-f0b674 InternetOpenUrlA 4995->5012 5002 f0baa2 4996->5002 5002->5002 5012->4996 5026 f0b67a-f0b757 5012->5026 5029 f0b762-f0b7da 5026->5029 5032 f0b7e8-f0b8fa call f0b826 call f11a27 5029->5032 5033 f0b7dc-f0b7e6 5029->5033 5032->4996 5041 f0b900-f0b960 5032->5041 5033->5032 5043 f0b962-f0b96a 5041->5043 5044 f0b96f-f0ba1b call f11a27 * 2 5041->5044 5043->5029
              APIs
              • InternetOpenUrlA.WININET(?,-F65E72D2,-8298B25A,518CFD8B,-5FFF4C64,?,?), ref: 00F0B66C
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: InternetOpen
              • String ID:
              • API String ID: 2038078732-0
              • Opcode ID: 85b1a4df4f1820dbda7bc73856041b5593975897f36f5d2769cc082592b326b7
              • Instruction ID: 26a2473d80c3ffef285e66d61c4e4b852ceb02a6f20897af299cc3f2ccd84e67
              • Opcode Fuzzy Hash: 85b1a4df4f1820dbda7bc73856041b5593975897f36f5d2769cc082592b326b7
              • Instruction Fuzzy Hash: EFB12236644346DFDF309E74CD95BEE37A2AF51360F95462EDC8AA7190E3318981BB02
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5051 f0b073-f0b074 5052 f0b026-f0b035 5051->5052 5053 f0b076-f0b078 5051->5053 5052->5051 5054 f0b0c9-f0b220 call f11a27 5053->5054 5055 f0b07a-f0b0c4 5053->5055 5068 f0b226-f0b42d call f0b2b1 call f11a27 5054->5068 5069 f0ba1e-f0ba9d call f11a27 5054->5069 5055->5054 5068->5069 5085 f0b433-f0b674 InternetOpenUrlA 5068->5085 5075 f0baa2 5069->5075 5075->5075 5085->5069 5099 f0b67a-f0b757 5085->5099 5102 f0b762-f0b7da 5099->5102 5105 f0b7e8-f0b8fa call f0b826 call f11a27 5102->5105 5106 f0b7dc-f0b7e6 5102->5106 5105->5069 5114 f0b900-f0b960 5105->5114 5106->5105 5116 f0b962-f0b96a 5114->5116 5117 f0b96f-f0ba1b call f11a27 * 2 5114->5117 5116->5102
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 033c5cdaed49c2f52fcbf8caea823926655389e2526fb4a2a1859e735bab8f47
              • Instruction ID: 2610981839395f3cd8611a322a0e0e7cf0d54b04639546a5982cede848909bc7
              • Opcode Fuzzy Hash: 033c5cdaed49c2f52fcbf8caea823926655389e2526fb4a2a1859e735bab8f47
              • Instruction Fuzzy Hash: 7CA15776604346CFDF348E74CDA5BEA37A1AF51350F95412ADC49AB1A0E3318A81FB42
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5124 f0a30f-f0a310 5125 f0a2c2-f0a30d 5124->5125 5126 f0a312-f0a314 5124->5126 5151 f0a35f-f0a362 5125->5151 5128 f0a365-f0a387 5126->5128 5129 f0a316-f0a34f 5126->5129 5137 f0a405-f0a407 5128->5137 5138 f0a389-f0a3b0 5128->5138 5144 f0a351-f0a35b 5129->5144 5145 f0a3cd-f0a3d7 5129->5145 5142 f0a40d-f0a454 5137->5142 5154 f0a3b4-f0a3b7 5138->5154 5152 f0a455 5142->5152 5149 f0a3d9-f0a3e3 5144->5149 5150 f0a35d-f0a35e 5144->5150 5145->5149 5145->5152 5157 f0a461 5149->5157 5158 f0a3e5-f0a407 5149->5158 5150->5151 5151->5154 5155 f0a466-f0a46f 5152->5155 5154->5137 5159 f0a475-f0a61b call f0e9fe 5155->5159 5160 f0a88f-f0aad6 call f0e911 call f0a98f 5155->5160 5157->5155 5158->5142 5179 f0a621-f0a79e 5159->5179 5180 f0e9fe-f0ea91 5159->5180 5181 f0aad8 5160->5181 5197 f0a7a4-f0a843 5179->5197 5198 f012ca-f0159a call f0e9fe call f09db1 call f0e9fe call f11a27 call f0e9fe 5179->5198 5188 f0eb83-f0eb8a LoadLibraryA call f0eba8 5180->5188 5189 f0ea97-f0eafc call f0f090 5180->5189 5181->5181 5196 f0eb8c-f0eb94 5188->5196 5202 f0eb73-f0eb7e call f0eba8 5189->5202 5203 f0eafe-f0eb13 call f0f090 5189->5203 5197->5198 5213 f0a849-f0a87c NtAllocateVirtualMemory 5197->5213 5245 f0159d-f01838 call f0ef30 5198->5245 5202->5196 5216 f0eb80 5202->5216 5203->5202 5214 f0eb15-f0eb71 call f0f090 5203->5214 5218 f0a882-f0a889 5213->5218 5219 f095e7-f095eb 5213->5219 5214->5202 5216->5188 5218->5160 5222 f095ec-f09670 5219->5222 5228 f09676-f096ce 5222->5228 5257 f0183e-f0c5c9 call f018e2 5245->5257
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2dba6e641932d6e56cc0377619dc0a913b037929f21792b845d5b5bf4abc1782
              • Instruction ID: 89973cfa6b6ddae0abf6ba6482d3cfcef6c64c4510d9f135b8f64ca1255e4299
              • Opcode Fuzzy Hash: 2dba6e641932d6e56cc0377619dc0a913b037929f21792b845d5b5bf4abc1782
              • Instruction Fuzzy Hash: 7991367AA05300CFCF79CE7588653E677A2FF41364F56402ACC46AB160E2B64D85BBC2
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5263 f0b064-f0b220 call f11a27 5271 f0b226-f0b42d call f0b2b1 call f11a27 5263->5271 5272 f0ba1e-f0ba9d call f11a27 5263->5272 5271->5272 5288 f0b433-f0b674 InternetOpenUrlA 5271->5288 5278 f0baa2 5272->5278 5278->5278 5288->5272 5302 f0b67a-f0b757 5288->5302 5305 f0b762-f0b7da 5302->5305 5308 f0b7e8-f0b8fa call f0b826 call f11a27 5305->5308 5309 f0b7dc-f0b7e6 5305->5309 5308->5272 5317 f0b900-f0b960 5308->5317 5309->5308 5319 f0b962-f0b96a 5317->5319 5320 f0b96f-f0ba1b call f11a27 * 2 5317->5320 5319->5305
              APIs
              • InternetOpenUrlA.WININET(?,-F65E72D2,-8298B25A,518CFD8B,-5FFF4C64,?,?), ref: 00F0B66C
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: InternetOpen
              • String ID:
              • API String ID: 2038078732-0
              • Opcode ID: c740beb88cdbb1b2373ac6e412e74152c30416bfef43b68f75df43fa151b9007
              • Instruction ID: 72ecd1c025f62bbebdd6acaefed13f780d856bf6b23e0bdd46eaf2e0df8efeb9
              • Opcode Fuzzy Hash: c740beb88cdbb1b2373ac6e412e74152c30416bfef43b68f75df43fa151b9007
              • Instruction Fuzzy Hash: 2B91573264434ADFDF308E74CD95BEE37A1AF55350F95412ADC89AB290E3318A81FB16
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5327 f0a26d-f0a27f 5330 f0a281-f0a28b 5327->5330 5331 f0a2fd-f0a307 5327->5331 5332 f0a309-f0a30d 5330->5332 5333 f0a28d-f0a2a3 5330->5333 5331->5332 5334 f0a35f-f0a407 5332->5334 5337 f0a321-f0a32b 5333->5337 5338 f0a2a5-f0a2af 5333->5338 5342 f0a40d-f0a454 5334->5342 5341 f0a32d-f0a34f 5337->5341 5340 f0a2b1-f0a2fb 5338->5340 5338->5341 5340->5331 5349 f0a351-f0a35b 5341->5349 5350 f0a3cd-f0a3d7 5341->5350 5351 f0a455 5342->5351 5353 f0a3d9-f0a3e3 5349->5353 5354 f0a35d-f0a35e 5349->5354 5350->5351 5350->5353 5355 f0a466-f0a46f 5351->5355 5362 f0a461 5353->5362 5363 f0a3e5-f0a407 5353->5363 5354->5334 5358 f0a475-f0a61b call f0e9fe 5355->5358 5359 f0a88f-f0aad6 call f0e911 call f0a98f 5355->5359 5381 f0a621-f0a79e 5358->5381 5382 f0e9fe-f0ea91 5358->5382 5383 f0aad8 5359->5383 5362->5355 5363->5342 5399 f0a7a4-f0a843 5381->5399 5400 f012ca-f0159a call f0e9fe call f09db1 call f0e9fe call f11a27 call f0e9fe 5381->5400 5390 f0eb83-f0eb8a LoadLibraryA call f0eba8 5382->5390 5391 f0ea97-f0eafc call f0f090 5382->5391 5383->5383 5398 f0eb8c-f0eb94 5390->5398 5404 f0eb73-f0eb7e call f0eba8 5391->5404 5405 f0eafe-f0eb13 call f0f090 5391->5405 5399->5400 5415 f0a849-f0a87c NtAllocateVirtualMemory 5399->5415 5447 f0159d-f01838 call f0ef30 5400->5447 5404->5398 5418 f0eb80 5404->5418 5405->5404 5416 f0eb15-f0eb71 call f0f090 5405->5416 5420 f0a882-f0a889 5415->5420 5421 f095e7-f095eb 5415->5421 5416->5404 5418->5390 5420->5359 5424 f095ec-f09670 5421->5424 5430 f09676-f096ce 5424->5430 5459 f0183e-f0c5c9 call f018e2 5447->5459
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bc660e8d7ccbd557cc22e98d2b3ebe21cae3e20ad3ab0cd8b9a3575fdb5483e2
              • Instruction ID: 1501c0eebf6be464f5f04c9d9b382da35d9c92e8fa95d19daa1e339a8337aac8
              • Opcode Fuzzy Hash: bc660e8d7ccbd557cc22e98d2b3ebe21cae3e20ad3ab0cd8b9a3575fdb5483e2
              • Instruction Fuzzy Hash: 8781797AA05300CFCF34CE7588257EA37A2EF45360F56402ACC869B161E2768D81FB83
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5465 f0b253-f0b254 5466 f0b206-f0b220 call f11a27 5465->5466 5467 f0b256-f0b258 5465->5467 5478 f0b226-f0b251 5466->5478 5479 f0ba1e-f0ba9d call f11a27 5466->5479 5468 f0b2a9 5467->5468 5469 f0b25a-f0b25c 5467->5469 5473 f0b2a8 5468->5473 5474 f0b2aa-f0b2ab 5468->5474 5471 f0b263 5469->5471 5476 f0b2e1-f0b2e7 5471->5476 5477 f0b265-f0b287 5471->5477 5473->5468 5474->5471 5475 f0b2ad-f0b2ae 5474->5475 5484 f0b2b1 5475->5484 5485 f0b305-f0b307 5475->5485 5481 f0b313-f0b322 5476->5481 5477->5485 5494 f0b289-f0b298 5477->5494 5480 f0b29f-f0b2df call f0b2b1 5478->5480 5495 f0baa2 5479->5495 5480->5476 5487 f0b328-f0b42d call f11a27 5481->5487 5492 f0b2b2 5484->5492 5485->5487 5488 f0b309-f0b310 5485->5488 5487->5479 5502 f0b433-f0b674 InternetOpenUrlA 5487->5502 5488->5481 5492->5492 5494->5480 5495->5495 5502->5479 5516 f0b67a-f0b757 5502->5516 5519 f0b762-f0b7da 5516->5519 5522 f0b7e8-f0b8fa call f0b826 call f11a27 5519->5522 5523 f0b7dc-f0b7e6 5519->5523 5522->5479 5531 f0b900-f0b960 5522->5531 5523->5522 5533 f0b962-f0b96a 5531->5533 5534 f0b96f-f0ba1b call f11a27 * 2 5531->5534 5533->5519
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 80fb9b554b97723af08ce8b298910c5790a162485636c12fe7a92aeaa60715f9
              • Instruction ID: 1befc2f1cc1dfef9401679e75de7e03f96b9636216285e3e916e59c5ea358902
              • Opcode Fuzzy Hash: 80fb9b554b97723af08ce8b298910c5790a162485636c12fe7a92aeaa60715f9
              • Instruction Fuzzy Hash: B4913736A44346CFDF348E74CD65BEE37A1AF91350F55412ADC4AAB1A0D3318A81BB52
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5541 f0b107-f0b220 call f11a27 5546 f0b226-f0b42d call f0b2b1 call f11a27 5541->5546 5547 f0ba1e-f0ba9d call f11a27 5541->5547 5546->5547 5563 f0b433-f0b674 InternetOpenUrlA 5546->5563 5553 f0baa2 5547->5553 5553->5553 5563->5547 5577 f0b67a-f0b757 5563->5577 5580 f0b762-f0b7da 5577->5580 5583 f0b7e8-f0b8fa call f0b826 call f11a27 5580->5583 5584 f0b7dc-f0b7e6 5580->5584 5583->5547 5592 f0b900-f0b960 5583->5592 5584->5583 5594 f0b962-f0b96a 5592->5594 5595 f0b96f-f0ba1b call f11a27 * 2 5592->5595 5594->5580
              APIs
              • InternetOpenUrlA.WININET(?,-F65E72D2,-8298B25A,518CFD8B,-5FFF4C64,?,?), ref: 00F0B66C
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: InternetOpen
              • String ID:
              • API String ID: 2038078732-0
              • Opcode ID: 41d87b0c6580b75573064e7cb932e56505c18ab5fc6402a017fcb6c126c0357b
              • Instruction ID: f6ba1d8753a86bdc7897fb4c0beea96fd64710b2e8b198ffabf68754822505ea
              • Opcode Fuzzy Hash: 41d87b0c6580b75573064e7cb932e56505c18ab5fc6402a017fcb6c126c0357b
              • Instruction Fuzzy Hash: 2C916A3264438ADFDF308E74CD94BEE37A2AF55350F54412ADC49AB294D3318A81FB16
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5602 f0b2b6-f0b2bd 5603 f0b275-f0b278 5602->5603 5604 f0b2bf-f0b2c0 5602->5604 5606 f0b22a-f0b251 5603->5606 5607 f0b27a-f0b287 5603->5607 5605 f0b2c3-f0b2e7 call f0b2b1 5604->5605 5619 f0b313-f0b322 5605->5619 5618 f0b29f-f0b2a0 5606->5618 5610 f0b305-f0b307 5607->5610 5611 f0b289-f0b298 5607->5611 5615 f0b328-f0b42d call f11a27 5610->5615 5616 f0b309-f0b310 5610->5616 5611->5618 5625 f0b433-f0b674 InternetOpenUrlA 5615->5625 5626 f0ba1e-f0ba9d call f11a27 5615->5626 5616->5619 5618->5605 5619->5615 5625->5626 5643 f0b67a-f0b757 5625->5643 5631 f0baa2 5626->5631 5631->5631 5646 f0b762-f0b7da 5643->5646 5649 f0b7e8-f0b8fa call f0b826 call f11a27 5646->5649 5650 f0b7dc-f0b7e6 5646->5650 5649->5626 5658 f0b900-f0b960 5649->5658 5650->5649 5660 f0b962-f0b96a 5658->5660 5661 f0b96f-f0ba1b call f11a27 * 2 5658->5661 5660->5646
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1f3665ad542e22bfdac4d4b37e79576bbe01227b9ff13d271f7b1e3235dbcde3
              • Instruction ID: cae430703f86a8f393b00fba65096a13ac4190e86e3e0bb242ae78d1f97aaac1
              • Opcode Fuzzy Hash: 1f3665ad542e22bfdac4d4b37e79576bbe01227b9ff13d271f7b1e3235dbcde3
              • Instruction Fuzzy Hash: 31816632A44386CFDF348F74CD59BEA37A2EF51350F55412ADC89AB1A0D3318A85BB06
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5668 f0b4dd-f0b4e0 5669 f0b492-f0b494 5668->5669 5670 f0b4e2-f0b4e4 5668->5670 5671 f0b446-f0b450 5669->5671 5672 f0b496-f0b497 5669->5672 5673 f0b535-f0b540 5670->5673 5674 f0b4e6-f0b4e8 5670->5674 5686 f0b452-f0b457 5671->5686 5675 f0b515-f0b51f 5672->5675 5676 f0b498 5672->5676 5677 f0b541-f0b674 InternetOpenUrlA 5673->5677 5678 f0b4e9-f0b4ec 5674->5678 5679 f0b521-f0b524 5675->5679 5676->5678 5680 f0b499-f0b49c 5676->5680 5700 f0ba1e-f0ba9d call f11a27 5677->5700 5702 f0b67a-f0b757 5677->5702 5683 f0b49e-f0b4a0 5678->5683 5684 f0b4ee-f0b4f0 5678->5684 5685 f0b525-f0b533 5679->5685 5680->5683 5683->5686 5687 f0b4a2-f0b4a3 5683->5687 5684->5677 5692 f0b4f1-f0b513 5684->5692 5685->5673 5693 f0b4a5-f0b4d7 5686->5693 5687->5679 5690 f0b4a4 5687->5690 5690->5693 5694 f0b42b-f0b42d 5690->5694 5692->5675 5693->5685 5699 f0b433-f0b442 5694->5699 5694->5700 5699->5671 5708 f0baa2 5700->5708 5707 f0b762-f0b7da 5702->5707 5711 f0b7e8-f0b8fa call f0b826 call f11a27 5707->5711 5712 f0b7dc-f0b7e6 5707->5712 5708->5708 5711->5700 5720 f0b900-f0b960 5711->5720 5712->5711 5722 f0b962-f0b96a 5720->5722 5723 f0b96f-f0ba1b call f11a27 * 2 5720->5723 5722->5707
              APIs
              • InternetOpenUrlA.WININET(?,-F65E72D2,-8298B25A,518CFD8B,-5FFF4C64,?,?), ref: 00F0B66C
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: InternetOpen
              • String ID:
              • API String ID: 2038078732-0
              • Opcode ID: 7afd4f50103c1cbbb0e5642bde00f1ac5e59cad5b49f3c976322d798d1e662f0
              • Instruction ID: 2b052019e11a66cc9136292e9496c5ac8833d47fd769b4e270bfd645b25e99b2
              • Opcode Fuzzy Hash: 7afd4f50103c1cbbb0e5642bde00f1ac5e59cad5b49f3c976322d798d1e662f0
              • Instruction Fuzzy Hash: DB811736604246CFCF38CF789D657EA37A1EF50360F59416ACC069B1A5E3318A85FB82
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 01ee3b56e766e8fc41233ab684824d9f900b90b306e8897a7b6833281e9f617e
              • Instruction ID: 9555499c42ce5852d151cf7252fdab31da17940ff7a984c2247f99cf5284dc62
              • Opcode Fuzzy Hash: 01ee3b56e766e8fc41233ab684824d9f900b90b306e8897a7b6833281e9f617e
              • Instruction Fuzzy Hash: EE71F53A904601CECF7CDE7890757D336A1BF50364FA6412ACD438B060E76A8CD6EAC6
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 6252 f0a3b9-f0a3d7 6257 f0a455 6252->6257 6258 f0a3d9-f0a3e3 6252->6258 6259 f0a466-f0a46f 6257->6259 6261 f0a461 6258->6261 6262 f0a3e5-f0a454 6258->6262 6263 f0a475-f0a61b call f0e9fe 6259->6263 6264 f0a88f-f0aad6 call f0e911 call f0a98f 6259->6264 6261->6259 6262->6257 6285 f0a621-f0a79e 6263->6285 6286 f0e9fe-f0ea91 6263->6286 6287 f0aad8 6264->6287 6303 f0a7a4-f0a843 6285->6303 6304 f012ca-f0159a call f0e9fe call f09db1 call f0e9fe call f11a27 call f0e9fe 6285->6304 6294 f0eb83-f0eb8a LoadLibraryA call f0eba8 6286->6294 6295 f0ea97-f0eafc call f0f090 6286->6295 6287->6287 6302 f0eb8c-f0eb94 6294->6302 6308 f0eb73-f0eb7e call f0eba8 6295->6308 6309 f0eafe-f0eb13 call f0f090 6295->6309 6303->6304 6319 f0a849-f0a87c NtAllocateVirtualMemory 6303->6319 6351 f0159d-f01838 call f0ef30 6304->6351 6308->6302 6322 f0eb80 6308->6322 6309->6308 6320 f0eb15-f0eb71 call f0f090 6309->6320 6324 f0a882-f0a889 6319->6324 6325 f095e7-f095eb 6319->6325 6320->6308 6322->6294 6324->6264 6328 f095ec-f09670 6325->6328 6334 f09676-f096ce 6328->6334 6363 f0183e-f0c5c9 call f018e2 6351->6363
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2066e4f14c11c567d17f94a5b4035a282e0c8c1bd9dbbea7fdc81423ba1b6b40
              • Instruction ID: 3da1596c0a3cea859bce931f62b9afedf96783e2eb9eee72981bbe6385757729
              • Opcode Fuzzy Hash: 2066e4f14c11c567d17f94a5b4035a282e0c8c1bd9dbbea7fdc81423ba1b6b40
              • Instruction Fuzzy Hash: 07718C3AA05344CFDF748E7488153EA77A2EF05320F56402ADC89AB161E3748D80FB83
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 6369 f0a414-f0a425 6370 f0a427-f0a444 6369->6370 6371 f0a3bb-f0a3d7 6369->6371 6372 f0a446-f0a451 6370->6372 6373 f0a3da-f0a3e3 6370->6373 6379 f0a455 6371->6379 6383 f0a3d9 6371->6383 6375 f0a452-f0a454 6372->6375 6377 f0a461 6373->6377 6378 f0a3e5-f0a412 6373->6378 6375->6379 6382 f0a466-f0a46f 6377->6382 6378->6375 6379->6382 6385 f0a475-f0a61b call f0e9fe 6382->6385 6386 f0a88f-f0aad6 call f0e911 call f0a98f 6382->6386 6383->6373 6404 f0a621-f0a79e 6385->6404 6405 f0e9fe-f0ea91 6385->6405 6406 f0aad8 6386->6406 6422 f0a7a4-f0a843 6404->6422 6423 f012ca-f0159a call f0e9fe call f09db1 call f0e9fe call f11a27 call f0e9fe 6404->6423 6413 f0eb83-f0eb8a LoadLibraryA call f0eba8 6405->6413 6414 f0ea97-f0eafc call f0f090 6405->6414 6406->6406 6421 f0eb8c-f0eb94 6413->6421 6427 f0eb73-f0eb7e call f0eba8 6414->6427 6428 f0eafe-f0eb13 call f0f090 6414->6428 6422->6423 6438 f0a849-f0a87c NtAllocateVirtualMemory 6422->6438 6470 f0159d-f01838 call f0ef30 6423->6470 6427->6421 6441 f0eb80 6427->6441 6428->6427 6439 f0eb15-f0eb71 call f0f090 6428->6439 6443 f0a882-f0a889 6438->6443 6444 f095e7-f095eb 6438->6444 6439->6427 6441->6413 6443->6386 6447 f095ec-f09670 6444->6447 6453 f09676-f096ce 6447->6453 6482 f0183e-f0c5c9 call f018e2 6470->6482
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8b24bfb21a0061fd7c109e93c5a2ae4f4f123856ced553dfb39cd9ba843ca559
              • Instruction ID: bf5fec43b246a40d8a8eebe0567b25044511305f1043f40c8f33217189285d7d
              • Opcode Fuzzy Hash: 8b24bfb21a0061fd7c109e93c5a2ae4f4f123856ced553dfb39cd9ba843ca559
              • Instruction Fuzzy Hash: 75619A36A40345DFDB319E648C057EE77A2EF46320F5A405ADC89AB251D3748DC1FB42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d22fa5c04c5bee61e594d551e948296bdfadda369dd9b35b3185b0c07190614c
              • Instruction ID: 735e2898d40a78b9c9455350f3bb13bf756fd11df5cae74a90daf7115857154f
              • Opcode Fuzzy Hash: d22fa5c04c5bee61e594d551e948296bdfadda369dd9b35b3185b0c07190614c
              • Instruction Fuzzy Hash: 51612A36908205CEDF7DDE7481713E737A1BFA1354FA6412ACD538B060E72988D5FA82
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c8a492d4ba6f9388bfd4ffb099ec67330f50cf044bbd87c509f978c158e5d335
              • Instruction ID: 5416c091f437d1c06b79a4f7006e8fdeaf6dc781640d9ebe9e30d541d1a2d4d7
              • Opcode Fuzzy Hash: c8a492d4ba6f9388bfd4ffb099ec67330f50cf044bbd87c509f978c158e5d335
              • Instruction Fuzzy Hash: 0E610636904201CECF7CDE7490757E736A1BF91364F66412ACD438B060D76A8DD5EAC2
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 7751 f0a4fe-f0a500 7752 f0a551-f0a583 7751->7752 7753 f0a502-f0a50b 7751->7753 7754 f0a589-f0a602 call f0e9fe 7752->7754 7753->7754 7755 f0a50d-f0a517 7753->7755 7764 f0a607-f0a61b 7754->7764 7756 f0a595-f0a59f 7755->7756 7757 f0a519-f0a523 7755->7757 7759 f0a5a1-f0a5ab 7756->7759 7757->7759 7760 f0a525-f0a52f 7757->7760 7763 f0a5ad-f0a5b7 7759->7763 7765 f0a629-f0a633 7759->7765 7762 f0a531-f0a53b 7760->7762 7760->7763 7766 f0a5b9-f0a5c3 7762->7766 7767 f0a53d-f0a547 7762->7767 7763->7766 7769 f0a635-f0a63c 7763->7769 7772 f0a621-f0a622 7764->7772 7773 f0e9fe-f0ea91 7764->7773 7765->7769 7770 f0a5c5-f0a5cf 7766->7770 7767->7770 7771 f0a549-f0a54c 7767->7771 7774 f0a67c-f0a79e 7769->7774 7776 f0a5d1-f0a5fd 7770->7776 7777 f0a64d-f0a67b 7770->7777 7771->7752 7772->7765 7789 f0eb83-f0eb8a LoadLibraryA call f0eba8 7773->7789 7790 f0ea97-f0eafc call f0f090 7773->7790 7787 f0a7a4-f0a843 7774->7787 7788 f012ca-f0159a call f0e9fe call f09db1 call f0e9fe call f11a27 call f0e9fe 7774->7788 7776->7764 7785 f0a602 call f0e9fe 7776->7785 7777->7774 7785->7764 7787->7788 7805 f0a849-f0a87c NtAllocateVirtualMemory 7787->7805 7851 f0159d-f01838 call f0ef30 7788->7851 7797 f0eb8c-f0eb94 7789->7797 7802 f0eb73-f0eb7e call f0eba8 7790->7802 7803 f0eafe-f0eb13 call f0f090 7790->7803 7802->7797 7821 f0eb80 7802->7821 7803->7802 7816 f0eb15-f0eb71 call f0f090 7803->7816 7808 f0a882-f0aad6 call f0e911 call f0a98f 7805->7808 7809 f095e7-f095eb 7805->7809 7843 f0aad8 7808->7843 7813 f095ec-f09670 7809->7813 7824 f09676-f096ce 7813->7824 7816->7802 7821->7789 7843->7843 7863 f0183e-f0c5c9 call f018e2 7851->7863
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f9c0d8b88934e88371d38a82f25c6fe2602bc75075c419a5771c692a0173b69c
              • Instruction ID: df67b23439412587145b32f11dcc6b44509c7912e7c06a70f53f70d87ba11b34
              • Opcode Fuzzy Hash: f9c0d8b88934e88371d38a82f25c6fe2602bc75075c419a5771c692a0173b69c
              • Instruction Fuzzy Hash: 5F517A7AA01344CFDF35CE758C117EA77A2BF45320F5A4029DC49AB261E3758E85EB82
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00F0E9FE: LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              • NtAllocateVirtualMemory.NTDLL ref: 00F0A867
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: AllocateLibraryLoadMemoryVirtual
              • String ID:
              • API String ID: 2616484454-0
              • Opcode ID: 5e7c5a9865fd5c9f3316c7984660eddfe2756d996104804a65faff075fc5aba7
              • Instruction ID: ee16501b1948285ecdd756377a8e67aa16a1d5a7d983d01a2d9963d71f450118
              • Opcode Fuzzy Hash: 5e7c5a9865fd5c9f3316c7984660eddfe2756d996104804a65faff075fc5aba7
              • Instruction Fuzzy Hash: E9518A76A41345DFDF709E648D143FE77A2EF0A320FA94029DC89A7251E3748A80FB42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e0f12039798b233cc3e29ea18d16672d89fd4dcd371e6e06aee60adfad18c24d
              • Instruction ID: c67851f591050dd96bf1fdc0bd5fc7ee45940c6a6e4938a999b784978366275a
              • Opcode Fuzzy Hash: e0f12039798b233cc3e29ea18d16672d89fd4dcd371e6e06aee60adfad18c24d
              • Instruction Fuzzy Hash: CB512936908206CFDF78DE7485713E733A1BFA1354FA6412ACD438B060D72A88D5FA82
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • InternetOpenUrlA.WININET(?,-F65E72D2,-8298B25A,518CFD8B,-5FFF4C64,?,?), ref: 00F0B66C
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: InternetOpen
              • String ID:
              • API String ID: 2038078732-0
              • Opcode ID: a13df4aea32c3530420a76854e6885588f5f9c299d9dde8c8ad591e95064e4f3
              • Instruction ID: e6604a9663db7579fbac27948b1c696237bcb63e3110ec40106d03ab32e275a1
              • Opcode Fuzzy Hash: a13df4aea32c3530420a76854e6885588f5f9c299d9dde8c8ad591e95064e4f3
              • Instruction Fuzzy Hash: D4613976A44346CFCF34CE74DD65BEA37A1AF51360F55412ADC059B1A0E3318A81FB82
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 990ee6523b2919d55217f3819c6a1b8187821e4175fabd36f485e4e904942f5b
              • Instruction ID: 6ca112069df34a6ca4f4e5fe69211ea52364c4bb94d426c5eda2e3889efae6ab
              • Opcode Fuzzy Hash: 990ee6523b2919d55217f3819c6a1b8187821e4175fabd36f485e4e904942f5b
              • Instruction Fuzzy Hash: A851F63A914601CECF6CDEB980767D737A1BF60394F56416ACD438B060D76A8CD6EAC2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ab7f436beb4f876c3df81f560b67e7e079a7d4aefb153b8c14091be23e5f285e
              • Instruction ID: 0b4728d06ea52a2972f74e10c47bda8a0bfe819b90e0a969107c01cdf49aa24a
              • Opcode Fuzzy Hash: ab7f436beb4f876c3df81f560b67e7e079a7d4aefb153b8c14091be23e5f285e
              • Instruction Fuzzy Hash: 5E513936A04201CFDF789EB880757E733A1BF60354FA6412ACD438B060D76A8DD5EAC6
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • NtAllocateVirtualMemory.NTDLL ref: 00F0A867
                • Part of subcall function 00F0E9FE: LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: AllocateLibraryLoadMemoryVirtual
              • String ID:
              • API String ID: 2616484454-0
              • Opcode ID: 006781ad0cfd15fb36a0493d905aaab62d699d1a19e08efcb3a36ffc8e3e2298
              • Instruction ID: 9ebd0405c542164ccd64ded189d34b3fa1b99ebf8a8e71048d00fb8b152343e4
              • Opcode Fuzzy Hash: 006781ad0cfd15fb36a0493d905aaab62d699d1a19e08efcb3a36ffc8e3e2298
              • Instruction Fuzzy Hash: 6251697AA04344CFDF75CF6588217EA77B2AF45320F6A4029D845AB161D3758E81FB82
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • InternetOpenUrlA.WININET(?,-F65E72D2,-8298B25A,518CFD8B,-5FFF4C64,?,?), ref: 00F0B66C
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: InternetOpen
              • String ID:
              • API String ID: 2038078732-0
              • Opcode ID: ebbc917ea7064720e6740fe4070334114d5aa253429673666ce6c9a5764eb41c
              • Instruction ID: 1799e50f63426b3b38f13d7f48b6dcfd483011371a2d403634e203c10b5442cb
              • Opcode Fuzzy Hash: ebbc917ea7064720e6740fe4070334114d5aa253429673666ce6c9a5764eb41c
              • Instruction Fuzzy Hash: 29512876A04346CFCF34CE74DD65BEA37A5AF51360F55412ADC09AB1A0E3318A81FB82
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7fc42ffb2b1a355ac843470d0a69adfcc890c666d710110b0d39d69176c300c2
              • Instruction ID: 2905c50af41338ae071c5df672e002ae5d691ad66c5ce89cd57023af8004e720
              • Opcode Fuzzy Hash: 7fc42ffb2b1a355ac843470d0a69adfcc890c666d710110b0d39d69176c300c2
              • Instruction Fuzzy Hash: 0F513736900201CFDFA8DEB884767D337A1BF61364F56416ACC429B060D76A8CE5EAC2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • NtAllocateVirtualMemory.NTDLL ref: 00F0A867
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: AllocateMemoryVirtual
              • String ID:
              • API String ID: 2167126740-0
              • Opcode ID: 560d2b12f4916e4024c5224460d73045775054a83b1c2b02803909621bfb9061
              • Instruction ID: 8ad7f3c25fe31639db4a31336b54613125f2aeb2b26ab897096f081f79880d8e
              • Opcode Fuzzy Hash: 560d2b12f4916e4024c5224460d73045775054a83b1c2b02803909621bfb9061
              • Instruction Fuzzy Hash: 0F417836A40286DFDB319E65CC447E9BBB2EF46320F59405ADC899B111D2348A81FB46
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • InternetOpenUrlA.WININET(?,-F65E72D2,-8298B25A,518CFD8B,-5FFF4C64,?,?), ref: 00F0B66C
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: InternetOpen
              • String ID:
              • API String ID: 2038078732-0
              • Opcode ID: 8564725cc85adf895ca5aaea7d406e60ffe3bbcc7b6845194afead579c5e4d52
              • Instruction ID: 2f151d70ad0edb6508a18b2f9d7b1d9d081f687efd3774a85a2eda198a6a2b25
              • Opcode Fuzzy Hash: 8564725cc85adf895ca5aaea7d406e60ffe3bbcc7b6845194afead579c5e4d52
              • Instruction Fuzzy Hash: 7D51B236608346CFDF34CE74CD65BEA37A5AF50360F55412ADC06AB1A1E7328981FB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e191d9e38396f8bc8e2fad3132955427808c4f9183c9b70310dc74d59ac07143
              • Instruction ID: d1359395e4b94f2c8d3fcd59f9dcc9563b6d3719cd42845c435f6cf0a9fe0387
              • Opcode Fuzzy Hash: e191d9e38396f8bc8e2fad3132955427808c4f9183c9b70310dc74d59ac07143
              • Instruction Fuzzy Hash: 79415B35900301CFDFA89EB881757D737A1AF61360F66415ACC468B060D73E8CE9EA82
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4d48df5b0ae01ef79b5b2575c332fcf50dac2529c83dc0da0ab45462a12a0f54
              • Instruction ID: cd8fd27507393c1f2bdc492e9eedb0db73f6969be6bcce55ac6c7f4c99e56c40
              • Opcode Fuzzy Hash: 4d48df5b0ae01ef79b5b2575c332fcf50dac2529c83dc0da0ab45462a12a0f54
              • Instruction Fuzzy Hash: C241A436905200CECFA9CEA990753C233A1EF61364F96515AC8A58F061D37A48FAEEC1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • NtAllocateVirtualMemory.NTDLL ref: 00F0A867
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: AllocateMemoryVirtual
              • String ID:
              • API String ID: 2167126740-0
              • Opcode ID: 52ab576938ab90fa1832a53737d2789bc7d7c6de8bb15a456f7b86e0ed92223f
              • Instruction ID: 992a59a1ab2598e63dd39cb1b30f85ecd6ed7f32e7b27f9129b7323881f6922d
              • Opcode Fuzzy Hash: 52ab576938ab90fa1832a53737d2789bc7d7c6de8bb15a456f7b86e0ed92223f
              • Instruction Fuzzy Hash: 4E417D36A45385DFDF719F658C407EC77B2EF1A320F694059DC899B251D3348A80EB46
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: e2b001a54d1231ca27657e019ec151c712438e02ade03943b3ed6413dbb95c32
              • Instruction ID: e22b555fe61b6144cfa98e08f50f4103f5cde573ed7ee923747877da5df38483
              • Opcode Fuzzy Hash: e2b001a54d1231ca27657e019ec151c712438e02ade03943b3ed6413dbb95c32
              • Instruction Fuzzy Hash: 7941E232908300CFCE69DF79947628777A2FF90354F57456EC8828B060A2B64896FEC3
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: InternetOpen
              • String ID:
              • API String ID: 2038078732-0
              • Opcode ID: daa9edabf03ea2ed0a63aa034d4230c66430427bd4a5f55ef9fb87de799de248
              • Instruction ID: 10d956b6765e3330ec6866b4e5a4f83f244daf994d131561beae7164e5b6066e
              • Opcode Fuzzy Hash: daa9edabf03ea2ed0a63aa034d4230c66430427bd4a5f55ef9fb87de799de248
              • Instruction Fuzzy Hash: B0313936904200CFDFA8DEB8C4B57D673A0EF51364F66442ACC559B010D33E8CEAEA91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • NtProtectVirtualMemory.NTDLL(-E1512D40,0000003A,0000003A), ref: 00F1147F
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: MemoryProtectVirtual
              • String ID:
              • API String ID: 2706961497-0
              • Opcode ID: c2c629add52828b8966dba2c2d3412dd73abbcd3205c9f244e3511932ecb825b
              • Instruction ID: db83ad7b48d847dfe66d3e3314f75490c262dd093162ca92d16c2d88b84b8146
              • Opcode Fuzzy Hash: c2c629add52828b8966dba2c2d3412dd73abbcd3205c9f244e3511932ecb825b
              • Instruction Fuzzy Hash: 4731137A919240CECF3CCF7A94753D37BA1FB92764B56416BC5128F020D6660C96EAC0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • EnumWindows.USER32(00F01247,?,00000000,?,00F0AA11,?,?), ref: 00F01123
                • Part of subcall function 00F0E9FE: LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: EnumLibraryLoadWindows
              • String ID:
              • API String ID: 2773682629-0
              • Opcode ID: 8164aa83402cbb1b42d531d8e6fdf1b26b6066542ab9d062dc3fae42f8e5943b
              • Instruction ID: a104e653ea20254b3180cf7023f55bf5425e7aa05c402652d03c1836d5ef33e4
              • Opcode Fuzzy Hash: 8164aa83402cbb1b42d531d8e6fdf1b26b6066542ab9d062dc3fae42f8e5943b
              • Instruction Fuzzy Hash: 61312335A04245CFCF28DF79886579A33F5BF853A4F21412EDC86CB190EA758985BB81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • NtAllocateVirtualMemory.NTDLL ref: 00F0A867
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: AllocateMemoryVirtual
              • String ID:
              • API String ID: 2167126740-0
              • Opcode ID: a7a03c196da0458e086d4e4ce34091f02fcd76684afa1bc49ae60a8c6c33e4cc
              • Instruction ID: dd6bd7a0d51484db9550e6c8cf2c7827c682f2c3024435a53c3468cac81a257d
              • Opcode Fuzzy Hash: a7a03c196da0458e086d4e4ce34091f02fcd76684afa1bc49ae60a8c6c33e4cc
              • Instruction Fuzzy Hash: A731277AA01244CFDF79CF7688613DA77F2AF45314F668469C8469B160E2718A81FB82
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • NtAllocateVirtualMemory.NTDLL ref: 00F0A867
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: AllocateMemoryVirtual
              • String ID:
              • API String ID: 2167126740-0
              • Opcode ID: fc59e11973e643b548d3ca05854b4b2d7d09aa452e1efab6895af2d066e532a2
              • Instruction ID: 5a8aa235383aa8783824d4fbab6df1107c6d17706d38e698432cbe36e1a99877
              • Opcode Fuzzy Hash: fc59e11973e643b548d3ca05854b4b2d7d09aa452e1efab6895af2d066e532a2
              • Instruction Fuzzy Hash: E3315E36A41245DFDF719F658D007FC77B2EF4A320F698069DC499B151D2348A80FB41
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 2e3c67002385155bafb2ac33c92856789f9d8f3d367e04935e95a2097c26353d
              • Instruction ID: 01009f4794d958a896db6c091b1563b756419f2ef6ea2f5d3e1f503ca7a94982
              • Opcode Fuzzy Hash: 2e3c67002385155bafb2ac33c92856789f9d8f3d367e04935e95a2097c26353d
              • Instruction Fuzzy Hash: 73312832608309CFDB656E7589683EAB7A2EF92360F96452F8CC243141E37148C6FB03
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: dc1d8b6acca05cbf8e6902629defd883fc741a568683b63ee611bd6a919662b7
              • Instruction ID: 3ef749bb789c27ebf350e707452d68fd5fd6ad1c5b028325873216e87610b3c9
              • Opcode Fuzzy Hash: dc1d8b6acca05cbf8e6902629defd883fc741a568683b63ee611bd6a919662b7
              • Instruction Fuzzy Hash: 6CA002B139200D12D580B57A490A64E111957E1342FE9C415F0119F68ECE598A7A77E1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Sleep.KERNEL32(-E1A31BC1,00000000,?), ref: 00F03291
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 58b2b4d688f54a7f371faac2d2e974e38d21dc327c7c9d4321c5ac604a0c3f07
              • Instruction ID: dc733f16229e99680aaff9e381ee2a03738cc48b06e8f428f7af448510985a86
              • Opcode Fuzzy Hash: 58b2b4d688f54a7f371faac2d2e974e38d21dc327c7c9d4321c5ac604a0c3f07
              • Instruction Fuzzy Hash: 03412232A04345DFCF348E388DAA7D737A7AF41391F95421ACC855B091E77A0A89FB42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fd875f180610d14780cc9cd7c035961fad8e5cd0ff66670324e7ac7b27f981e2
              • Instruction ID: 4059b62fa5a43bad88e322ecad5c726c5c6a59f29f7ada81d1984d1a82118449
              • Opcode Fuzzy Hash: fd875f180610d14780cc9cd7c035961fad8e5cd0ff66670324e7ac7b27f981e2
              • Instruction Fuzzy Hash: CD22BA35A0030A9FDF345E788DA97EA37A7AF56360FA5402DDC8997181D33489C6FB42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 578d2b9999e48570d9f90bfbb9e16b869e2aaddee8463aead5c7a41b8354afe2
              • Instruction ID: 1f34344efd6e8170d5c1295b2c63d697eab349592ad4b272d8ed4adc78be62db
              • Opcode Fuzzy Hash: 578d2b9999e48570d9f90bfbb9e16b869e2aaddee8463aead5c7a41b8354afe2
              • Instruction Fuzzy Hash: 4312A935A0430A9FDF345E748CA93EA37A7AF56360FA5402EDC8697181D33489C6FB42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 793f8139f513b7c483d71a09dcd18dee417231a6449d11dafe02feca526319dd
              • Instruction ID: 482eb9070257102cbb02ae40b04714b04d77b9ef3f07283eb6d4efdd84e2f59e
              • Opcode Fuzzy Hash: 793f8139f513b7c483d71a09dcd18dee417231a6449d11dafe02feca526319dd
              • Instruction Fuzzy Hash: 4B12AA35A003069FDF345E788CA97EB37A7AF56360FA5402EDC8697181D33489C6FA42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3576cf5d7b4baaea59d18cb0b7867f748aaabd492ed5425ca940f09fb55ebf2e
              • Instruction ID: e44452a89db28f3d52fc25293113881bf72f7339334dd3771b157ab154236ec0
              • Opcode Fuzzy Hash: 3576cf5d7b4baaea59d18cb0b7867f748aaabd492ed5425ca940f09fb55ebf2e
              • Instruction Fuzzy Hash: 3912AA35B0030A9FDB305E748DA87EA37A7AF56360FA5402DDC8997185D73489C6FB12
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 417e98c42479451d36919a46fed1295b3123da61b451c39dd8f7c9d52a0ce64a
              • Instruction ID: a829b02aa396902a292431c1f1c5963dc4dbd109d29eb967f65585f16d684ea1
              • Opcode Fuzzy Hash: 417e98c42479451d36919a46fed1295b3123da61b451c39dd8f7c9d52a0ce64a
              • Instruction Fuzzy Hash: 4612AC75A003069FDF345E788CA97EA37A7AF56360FA5402EDC86D7181D33489C6FA42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6efbe9cdc926583886c0d0902f8d67ba305f3be84a7a5f37cc82104862399797
              • Instruction ID: d574c9036fc9c5f2bb65181e0f20baf900dc75493f0d3f8e2c74d76508784542
              • Opcode Fuzzy Hash: 6efbe9cdc926583886c0d0902f8d67ba305f3be84a7a5f37cc82104862399797
              • Instruction Fuzzy Hash: D502AB35B0430A9FDB305E748DA87EA37A7AF56360FA5402DDC8597185D33489C6FB12
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6e2fb06cf498841c93ca326a0b1e84628f9fd8ce7981b66777102af0da9643e
              • Instruction ID: 3461e25f73bfd068f6e4648233fd20d5407822e3cf252501ab9a1563381b7a08
              • Opcode Fuzzy Hash: b6e2fb06cf498841c93ca326a0b1e84628f9fd8ce7981b66777102af0da9643e
              • Instruction Fuzzy Hash: 8B02AB35A043059FDF305E748DA93EB37A7AF56360F95402EDC8697181D33489C6FA42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4ef6eaf07820104f9393f5f4e565456643411fee630b8d1d385cff3e6dab042f
              • Instruction ID: eda060284c5582f4da6f40d979477db8943c8d54c597f8cf6ca36fac7fab0294
              • Opcode Fuzzy Hash: 4ef6eaf07820104f9393f5f4e565456643411fee630b8d1d385cff3e6dab042f
              • Instruction Fuzzy Hash: 51F1A935A043059FDF345EB489A93EB37A7AF52360FA9402EDC8697181D3748DC6FA42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f78a62e27b6fc8c3415cbf4c913359151569b50c9eb0eb6b826a447e52b08252
              • Instruction ID: 374c3abfc77d6e56ea634c657930040756b1c08de6de213c0ac62666dfbf211d
              • Opcode Fuzzy Hash: f78a62e27b6fc8c3415cbf4c913359151569b50c9eb0eb6b826a447e52b08252
              • Instruction Fuzzy Hash: 74B17B715083468FDB216E348DA53DA7BA2BF53360F69465ECCC6C7192D3258886E742
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1d9d582d7e7c5b2ce2355b4a0a41d35b7545de0c39791481d9549318bd72f808
              • Instruction ID: 5eeee4776dc06ce7b7461ba78bf07849f01cb5a21bd269e6fb4b28192d7e7262
              • Opcode Fuzzy Hash: 1d9d582d7e7c5b2ce2355b4a0a41d35b7545de0c39791481d9549318bd72f808
              • Instruction Fuzzy Hash: C681497160430ACFDB24AE3489553EA3BA2BF56390F95461EDCC687294D330C985EB42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 321796d75ed5a68b075cd0caf48e6fa6eb76e5110ae4da56938e204e14519313
              • Instruction ID: 2c362a3ccb87419a8637bce68b83024afadc4778cd165e5c9ebaf56ecc66561a
              • Opcode Fuzzy Hash: 321796d75ed5a68b075cd0caf48e6fa6eb76e5110ae4da56938e204e14519313
              • Instruction Fuzzy Hash: A1613A7160430ACFDF20AE3489553EA3BA2BF56390F95461EDCC6C7294D734C986EB42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 7569a0436b086cf044d5f235e7b0be80f7d0e1b716d44b88933db8347db52665
              • Instruction ID: 4ad38b969b70d20ebed58be3c78aaafcded9da4558a5328888cfd711dbf75945
              • Opcode Fuzzy Hash: 7569a0436b086cf044d5f235e7b0be80f7d0e1b716d44b88933db8347db52665
              • Instruction Fuzzy Hash: FD512971A0430ACFEF246E348D553EB3BA2BF56390F95461ADCC5C7194D335C986AB42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 88ebd68b15449031ba2a757067d6fc41d830fdb8bdeab52cce9770a65c7097c5
              • Instruction ID: c89589a6f1f5e37bc8509803714d86c57a4c4ab3fee000a8102fb16aa944385c
              • Opcode Fuzzy Hash: 88ebd68b15449031ba2a757067d6fc41d830fdb8bdeab52cce9770a65c7097c5
              • Instruction Fuzzy Hash: CB513D7290430ACFEB209E348D553EB7BB2BF56390F96462EDCC597194D3318986A742
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: 8
              • API String ID: 1029625771-4194326291
              • Opcode ID: 28fc9951545268c93fb872fc8ca52ae5472a8860df475e4c54737ec6db9a9381
              • Instruction ID: 895658636b56b0b92f6801bc0ea667aa5c8f13c4b85e1422d1c97261916bd929
              • Opcode Fuzzy Hash: 28fc9951545268c93fb872fc8ca52ae5472a8860df475e4c54737ec6db9a9381
              • Instruction Fuzzy Hash: 3C11E6B9909100CDCE3CDF79547674637A2BFC0364F86487ADC438A4B1E57A4895B9C2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: 8
              • API String ID: 1029625771-4194326291
              • Opcode ID: 7cf0fceec003c88099ea520848d9c4343df829f0d7aa9afebef8f9f76ed7fd03
              • Instruction ID: bad66f06ad7e7846683b0e7cd15f906f5a66463af5780024ab97d427cf63039c
              • Opcode Fuzzy Hash: 7cf0fceec003c88099ea520848d9c4343df829f0d7aa9afebef8f9f76ed7fd03
              • Instruction Fuzzy Hash: 3D11E1B9A051009DCF3CEF79547774B73A1AFC0368F96883ADC038A4A0E56A4C94B9C2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 3a7b27d1dd733a7c7fd15cd3ef17720f1492b9d60f130d92de4c4f95db5412b3
              • Instruction ID: 76cc5bf5e96c56b2f9faa4e1a3d33cea6c938cb496c7d8e134d178b6c6595c03
              • Opcode Fuzzy Hash: 3a7b27d1dd733a7c7fd15cd3ef17720f1492b9d60f130d92de4c4f95db5412b3
              • Instruction Fuzzy Hash: BC4139747043069BDB209E7D99A07EB73E2AF86760F94863DEC8AC7295D73088C5B701
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • InternetOpenUrlA.WININET(?,-F65E72D2,-8298B25A,518CFD8B,-5FFF4C64,?,?), ref: 00F0B66C
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: InternetOpen
              • String ID:
              • API String ID: 2038078732-0
              • Opcode ID: db1a38383f8460c024cd94a2897209aa60500f1aa0d65a91af2ac172f9bccca8
              • Instruction ID: 27c3ee83757d856438b1dcf4ed7465995fe8ea4f7145fc475bd793832877b344
              • Opcode Fuzzy Hash: db1a38383f8460c024cd94a2897209aa60500f1aa0d65a91af2ac172f9bccca8
              • Instruction Fuzzy Hash: 9A41D236909346CFDF34CE748D65BEA37A1EF51360F5A416ACC469B0A1E3328981FB81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • EnumWindows.USER32(00F01247,?,00000000,?,00F0AA11,?,?), ref: 00F01123
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: EnumWindows
              • String ID:
              • API String ID: 1129996299-0
              • Opcode ID: 5182704c7a36eb0c4710baf0cfe39ef5a5894e2a322d20dd3fbc267baa047ab7
              • Instruction ID: 74e5247e15e0fd7d2b1b0b7482e8c2dcc041a362a23fdab72b3307f61beb7e00
              • Opcode Fuzzy Hash: 5182704c7a36eb0c4710baf0cfe39ef5a5894e2a322d20dd3fbc267baa047ab7
              • Instruction Fuzzy Hash: 7D11043120424ACBDB64AF38D8947AE37F5BF4A3A0F50402DEC8ACB281DB349585A702
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 5216d6efcf3444afd559e7b787fe01fdbc0d94172401f2cc5cca16dd5f872380
              • Instruction ID: 17a7c2aa8ee30325910441b025ac6da2305d53baba668516b442e055e3ec1048
              • Opcode Fuzzy Hash: 5216d6efcf3444afd559e7b787fe01fdbc0d94172401f2cc5cca16dd5f872380
              • Instruction Fuzzy Hash: 1301D2B4B04209AAEF346E389C517EE73A6AFC4310F948439BC4AC2681C734C984B601
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Sleep.KERNEL32(-E1A31BC1,00000000,?), ref: 00F03291
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 3c65f901c55f1db0e3b3d8ac15f4a808ed02398ad5e31167bc915cf2d650e431
              • Instruction ID: 52f64bf36a1418c9f0506515d9819bb68c8b02a0ad9f8d4e40fde3c30e83d34f
              • Opcode Fuzzy Hash: 3c65f901c55f1db0e3b3d8ac15f4a808ed02398ad5e31167bc915cf2d650e431
              • Instruction Fuzzy Hash: 47411332904300DFDF388F389DA77D337A7AF41394F55421ADC859A0E0E77A4A45EA82
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Sleep.KERNEL32(-E1A31BC1,00000000,?), ref: 00F03291
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 8a4fdc4f048321642751c553d365e9b4accd13f749cd4eb92e801e957064af54
              • Instruction ID: b0abd8d62fabcf9a04f9f9a10b76b6a69fece7190be86b7611c5343d51b9785e
              • Opcode Fuzzy Hash: 8a4fdc4f048321642751c553d365e9b4accd13f749cd4eb92e801e957064af54
              • Instruction Fuzzy Hash: 30312631604349AFDF305E28CE967DA37A7AF06790F54020A9D99571C1D73A4789FB03
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Sleep.KERNEL32(-E1A31BC1,00000000,?), ref: 00F03291
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: cd7482e99e2ac9787d10c8520881b6e5735bf9f28d6002cb25afcf8d6f40938a
              • Instruction ID: 39efa12f0fa60f7b0815159c0750e76dee39c613e59c76a42ecf6b546dc62877
              • Opcode Fuzzy Hash: cd7482e99e2ac9787d10c8520881b6e5735bf9f28d6002cb25afcf8d6f40938a
              • Instruction Fuzzy Hash: FB3137359047009FCF388E388DB67C337ABAF45391F65421ADC569A1E0E7764A45FA82
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Sleep.KERNEL32(-E1A31BC1,00000000,?), ref: 00F03291
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 19e7e79d225b645d3075a4a7741f1971fb015177e66d05e66acfaf8b93ccc874
              • Instruction ID: c3c507aa9ff502151b6cad5d144652f8989d45dcdf03f79130f005ea64834505
              • Opcode Fuzzy Hash: 19e7e79d225b645d3075a4a7741f1971fb015177e66d05e66acfaf8b93ccc874
              • Instruction Fuzzy Hash: 3F214531504348AFDF305F28DED67D63767AF02790F64030AACA95A1C1E73A4685FB02
              Uniqueness

              Uniqueness Score: -1.00%

              Non-executed Functions

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: D,Uq$vNE@
              • API String ID: 1029625771-2180908374
              • Opcode ID: 301e1a65dc5c6d87734c065b64114a703893c2a6ddd1bee8d4a093271eaa6b9c
              • Instruction ID: a9d98f9d8180d3dc94082f90ca909970463e91abe1e616e5e241854601092351
              • Opcode Fuzzy Hash: 301e1a65dc5c6d87734c065b64114a703893c2a6ddd1bee8d4a093271eaa6b9c
              • Instruction Fuzzy Hash: BF814876A047069FDB345D288DE43E73396AF95350FA4813ECC8687684D73588CEF682
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: o$vNE@
              • API String ID: 0-3013816498
              • Opcode ID: 66dee773efdf56038cb3eb9caaed5193beb78144a034ba12c5bc34e9bb77a6d4
              • Instruction ID: 40265be74b72c77074b0d69c15573797ecefa3313ff3a7a15f7f86b52eb784c0
              • Opcode Fuzzy Hash: 66dee773efdf56038cb3eb9caaed5193beb78144a034ba12c5bc34e9bb77a6d4
              • Instruction Fuzzy Hash: AA51287AD04741CECF38CE38947539336A2BF81354F96423ACC429B464E3764D8AEAC2
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: D,Uq$vNE@
              • API String ID: 1029625771-2180908374
              • Opcode ID: 3b55ae6924ae1ff21f4745ea4abc4a0d5e05315b23c5063422a3542ddc116b70
              • Instruction ID: a583f6fe873f5ca8b1818aae96ed71ae20846cc3f44d1fb5afdbf7d86c360d65
              • Opcode Fuzzy Hash: 3b55ae6924ae1ff21f4745ea4abc4a0d5e05315b23c5063422a3542ddc116b70
              • Instruction Fuzzy Hash: C9514B76E00306CFDB348E6889B53D73362BF50364FA54139CC829B5A4D735898AFAC2
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: cE*
              • API String ID: 0-336441071
              • Opcode ID: f6660211ed4f1492433e0de51848e0238107bf58cf3d650e7860ee0843938b90
              • Instruction ID: 6e64b80d05410364e6ef385047ce8a54fd089ff6c00caf12f66816b99d7a53f9
              • Opcode Fuzzy Hash: f6660211ed4f1492433e0de51848e0238107bf58cf3d650e7860ee0843938b90
              • Instruction Fuzzy Hash: 54121276604706DFDB28CE28C8A07DB77A2FF54750F55422DDC898B290E3B5A981EF81
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: cE*
              • API String ID: 0-336441071
              • Opcode ID: 2b69614e1e30af933a9eb14d8a7b162a98d21c244729069976afb8857a6ad4cf
              • Instruction ID: d13673db0edfc152edb06036f63232e8a9e92bcb26b0971529070303e137ada7
              • Opcode Fuzzy Hash: 2b69614e1e30af933a9eb14d8a7b162a98d21c244729069976afb8857a6ad4cf
              • Instruction Fuzzy Hash: 89022476604B06DFDB28CE28C8A07DBB7A2FF54750F85422DDC8987290D7B19981EF81
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: cE*
              • API String ID: 0-336441071
              • Opcode ID: c57f9988910a2384c6efc90ab7e5ef7e1d428c50db2fb4e3be771934df9b3420
              • Instruction ID: 4a3153c95e9eec9de8d25b4149cb9b0bae93982a1044945199ce2aea2d2728ce
              • Opcode Fuzzy Hash: c57f9988910a2384c6efc90ab7e5ef7e1d428c50db2fb4e3be771934df9b3420
              • Instruction Fuzzy Hash: A2F10271704B06DFDB24CE28C8A47DAB7A2FF58750F85422DDC8987280D7B1A981EF81
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: .C1K
              • API String ID: 0-874949410
              • Opcode ID: a71790f5d320d9b08b06520d9334845152856b2f48e3cc59b5fbb96e8190060c
              • Instruction ID: 18570682f10510cf38ab61ee1a98b130c19816f830e4130397fa096cd0b0e77b
              • Opcode Fuzzy Hash: a71790f5d320d9b08b06520d9334845152856b2f48e3cc59b5fbb96e8190060c
              • Instruction Fuzzy Hash: 3EE1327A604201CFCF38CF7988757D777A2BF50364F96412ED842DF060E7768896AA82
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: cE*
              • API String ID: 0-336441071
              • Opcode ID: 276a89e92d184a5c1f423a180d123da3f345c1204d2f08733ebf5d8fb7fffc29
              • Instruction ID: 32e29156c6a591fea2e069f51c376ee2ceebacf9692fe5cb5013612e8b28b36b
              • Opcode Fuzzy Hash: 276a89e92d184a5c1f423a180d123da3f345c1204d2f08733ebf5d8fb7fffc29
              • Instruction Fuzzy Hash: C4F1F175704B06DFDB28CE28C9A47DBB7A2FF54790F55422DDC8987280D7B0A981AF81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: cE*
              • API String ID: 1029625771-336441071
              • Opcode ID: 931937bfdb1546f12b5c98d938cb718cccb4fcedd1ecd3a573422a90f8c154df
              • Instruction ID: 1405bc123224d0d7178b334273ca7013c00735b616a006ef2210826c5a077f4d
              • Opcode Fuzzy Hash: 931937bfdb1546f12b5c98d938cb718cccb4fcedd1ecd3a573422a90f8c154df
              • Instruction Fuzzy Hash: 61D10471704B06DFDB24DE28CDA47DBB7A2FF49750F58422DDC8987280D770A981AB81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: cE*
              • API String ID: 1029625771-336441071
              • Opcode ID: 5e03c22cb7a45848349b378203f328b2302df0343bbbfbad090fcf1a547388de
              • Instruction ID: 2615b05a228e13caa296434ec108af2801e7e58b6423b75377875d637193ca0d
              • Opcode Fuzzy Hash: 5e03c22cb7a45848349b378203f328b2302df0343bbbfbad090fcf1a547388de
              • Instruction Fuzzy Hash: EBC1137170470A9FDB24DE28CD947EB73E2FF497A0F59422DDC8987280D7B09985AB81
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: cE*
              • API String ID: 0-336441071
              • Opcode ID: 9d4dcfd5d305d5387a6b08b91e01058eb45efeb78b053c01017272a39d27b189
              • Instruction ID: 3274ea43c9805a7ad29427668f0550bf909498d7219844fc2120c9c7a79f90ba
              • Opcode Fuzzy Hash: 9d4dcfd5d305d5387a6b08b91e01058eb45efeb78b053c01017272a39d27b189
              • Instruction Fuzzy Hash: 10C1027270470A9FDB24DE28CC947EB73A2FF45760F59422EDC8987280D7B09985EB41
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: cE*
              • API String ID: 0-336441071
              • Opcode ID: 20f2e66dd51098db6225de683ffcd1334b6e3285951899bace47ece80d4ce4e2
              • Instruction ID: e834028affb85ba699b7a9b02bc1ae563d680f203ac35f75228618ff0c430eaf
              • Opcode Fuzzy Hash: 20f2e66dd51098db6225de683ffcd1334b6e3285951899bace47ece80d4ce4e2
              • Instruction Fuzzy Hash: 30C12375604B069FDB24CE28CCA47DB73E2FF44760F59422ADC8987290E7B19981EF81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: cE*
              • API String ID: 1029625771-336441071
              • Opcode ID: 40add18c557ba412a96a7b2b4d72f93a4e9e946d4fb7b704277ef275eed0b37b
              • Instruction ID: b067bc0dbbdc9fdceecde9083223fa3a10069cb68aead659702d5a535fbc72d8
              • Opcode Fuzzy Hash: 40add18c557ba412a96a7b2b4d72f93a4e9e946d4fb7b704277ef275eed0b37b
              • Instruction Fuzzy Hash: 7FB1337170470A9FDB249E28CC947EB73E2FF45760F59422EDC8987280D7B09985EB81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: cE*
              • API String ID: 1029625771-336441071
              • Opcode ID: c19f23c0ce5594ce3f5905dd03859ffb58f8cbd3a3dc72227dc16a96d2c168a0
              • Instruction ID: f8ff296bb5bd4928224813960c5093bd1c9eab6771ad9e03071ddacbe2916298
              • Opcode Fuzzy Hash: c19f23c0ce5594ce3f5905dd03859ffb58f8cbd3a3dc72227dc16a96d2c168a0
              • Instruction Fuzzy Hash: 1BB1227260474A9FDB24DE28CC947EB73E2FF45760F59422EDC8987280D7B19981EB81
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: cE*
              • API String ID: 0-336441071
              • Opcode ID: 4374d83f36e6cb4ee52cfc150e603b6fa32904ac8f9136aaf6146c7cc1895267
              • Instruction ID: a5accbcc611a384cdd7b589ae10c3fdbdeb834d094cd78fd6640ec6426f2d561
              • Opcode Fuzzy Hash: 4374d83f36e6cb4ee52cfc150e603b6fa32904ac8f9136aaf6146c7cc1895267
              • Instruction Fuzzy Hash: 19A12471604B0ADFDB249E28CC947EB77E2FF05750F494229DC8987280E7B59985EF81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: cE*
              • API String ID: 1029625771-336441071
              • Opcode ID: e144a1af78e5d71ac869455abd9bd7edb20db0fb3beaca275cc66ffedcd984b3
              • Instruction ID: 48b9ce8a6a8888036d7d374b5f28136a2d8a2c738031d168519e282cf387d7df
              • Opcode Fuzzy Hash: e144a1af78e5d71ac869455abd9bd7edb20db0fb3beaca275cc66ffedcd984b3
              • Instruction Fuzzy Hash: 5DA12171604B0ADFDB249E28CD947EB73E2FF05760F49422DDC8987280D7B59985EB81
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: cE*
              • API String ID: 0-336441071
              • Opcode ID: e2eb81d105e8764c58fb9b2423d144ed05ef0ad66a42f05660813062e4e90059
              • Instruction ID: a92cede499843af65e902f335929eda3bad59eaa33d5128acfd3e8709128ab55
              • Opcode Fuzzy Hash: e2eb81d105e8764c58fb9b2423d144ed05ef0ad66a42f05660813062e4e90059
              • Instruction Fuzzy Hash: D8913372604B06DFDB28CE28C8A47DB73E1FF05750F45422ADC8987290E7B59955EF81
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: CO3j
              • API String ID: 0-2318339908
              • Opcode ID: b4ee0ae3815478616ff6aa44a23d3bb9cef7705571ad6487e9ceb58def5a64cc
              • Instruction ID: 2667385ceeecfefd92fcea0e2c03f270ebb08bc7cae42d1bc845324da57605e8
              • Opcode Fuzzy Hash: b4ee0ae3815478616ff6aa44a23d3bb9cef7705571ad6487e9ceb58def5a64cc
              • Instruction Fuzzy Hash: A49147B1A04345CFCF388E3888657EB77A2BF90350F92451EDD8697290D7315986EB82
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: .C1K
              • API String ID: 0-874949410
              • Opcode ID: 63db04e08c9795f7d30e96715d441d4f7a8b64d1eecb7f1e065bb3e566689e0e
              • Instruction ID: f3d5571df0af217102e24422e9fe803ccf84746bd8a0c2f109ffbcc50144726b
              • Opcode Fuzzy Hash: 63db04e08c9795f7d30e96715d441d4f7a8b64d1eecb7f1e065bb3e566689e0e
              • Instruction Fuzzy Hash: CC714876508301CFCF38DF7488A57EA36E2EF54360FA6802DDC86DB051D3758891EA42
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: .C1K
              • API String ID: 0-874949410
              • Opcode ID: ab338033a141e233bb223be4cbc042765491b927a73a9414b6812885bf1d18b0
              • Instruction ID: 41cbee85edaf0a95abfba46b0e6eb3f1c186c4662b6cb1fcea503d72857a37ed
              • Opcode Fuzzy Hash: ab338033a141e233bb223be4cbc042765491b927a73a9414b6812885bf1d18b0
              • Instruction Fuzzy Hash: 1A712576604305CFCF389F7588A47EA76E2AF54360FA6802EDC86DB055D7718891EA42
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: CO3j
              • API String ID: 0-2318339908
              • Opcode ID: 8918662803fcb1fa7929cff2c95a813312214f7c96629e0d4af014052d080429
              • Instruction ID: 212d667dcff0d475b16193380bd49783eee689290af2a028cdf4749498d0dffc
              • Opcode Fuzzy Hash: 8918662803fcb1fa7929cff2c95a813312214f7c96629e0d4af014052d080429
              • Instruction Fuzzy Hash: 1C8175B16083468FDB385E38CC957EB77A2AF94790F91450EDDCA87280D7305986EB03
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: CO3j
              • API String ID: 0-2318339908
              • Opcode ID: dceb232ddaa92d0e9da5b3d46ef96fa99891ee7ca778f7e1ced61d7dd05631c3
              • Instruction ID: 149ceb11d8c407ce5738a58112189f081d8788b4541999ec63a9a77c07fb2f07
              • Opcode Fuzzy Hash: dceb232ddaa92d0e9da5b3d46ef96fa99891ee7ca778f7e1ced61d7dd05631c3
              • Instruction Fuzzy Hash: 847178B1A04345CFCF38CE688CA53D777A2BF90354F52412EDD468B190E7755986EB82
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: cE*
              • API String ID: 0-336441071
              • Opcode ID: f29449c5824bb1435e36f24f5861e5208c313c37c8e655b5dab5997a63eff11e
              • Instruction ID: 341d7072e4b211f37c2bbb46ff21d19a2a6e763d8c76dc79bf1efa5cb59ccf0f
              • Opcode Fuzzy Hash: f29449c5824bb1435e36f24f5861e5208c313c37c8e655b5dab5997a63eff11e
              • Instruction Fuzzy Hash: E171EAB5600B06CFDB28CF2988A47C777E1BF44750F46422ACC468B290E7B59952EEC1
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: CO3j
              • API String ID: 0-2318339908
              • Opcode ID: f5b059cc9ca571e6faca4865d42c3f1d949daf87a82ffbfcf8405c9e8c24d0fc
              • Instruction ID: 1ab10ea084c2408d46bea2008f706eb18956f0208b8ac10da539fe0d0d220e05
              • Opcode Fuzzy Hash: f5b059cc9ca571e6faca4865d42c3f1d949daf87a82ffbfcf8405c9e8c24d0fc
              • Instruction Fuzzy Hash: 09616CB1504345CFCF388E28CCA53EB77A2BF95350F91412EDD8A87290D7315986EB82
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: CO3j
              • API String ID: 0-2318339908
              • Opcode ID: e19d2f019ad4af53c990c48e57c09d4eb962e835e2e19f7efab442ae9b46b3d2
              • Instruction ID: e46365b49e0591b4c48ff2c7decf5e9911735f4350c619282f39d4fa8fb07e2b
              • Opcode Fuzzy Hash: e19d2f019ad4af53c990c48e57c09d4eb962e835e2e19f7efab442ae9b46b3d2
              • Instruction Fuzzy Hash: 346168B6A04244CFDF38CF3898B57D737A2BF90344F51402EC9468B190E7729986EB82
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID: vNE@
              • API String ID: 0-4005984838
              • Opcode ID: 13e2e605c1d207b130bad1fab4a9b4be25cbfcde1d65f30a9510b218e3591536
              • Instruction ID: 7a7783d23b69f4f8435e94f8c96a61398698630c43736afafeeb45ee92c1a4d5
              • Opcode Fuzzy Hash: 13e2e605c1d207b130bad1fab4a9b4be25cbfcde1d65f30a9510b218e3591536
              • Instruction Fuzzy Hash: 96413976D00302CECF388D7899A53D33266BF91354F96423ACC8297554D3364D8EEAC2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 869dca8b90f0aa852f142cbeafcfc070684514c4268adf9b2a9ab0a54a7423b6
              • Instruction ID: 82fff63506d7b307f5ff18374e2c91afa3fd8491778712519b9a574f684b5dae
              • Opcode Fuzzy Hash: 869dca8b90f0aa852f142cbeafcfc070684514c4268adf9b2a9ab0a54a7423b6
              • Instruction Fuzzy Hash: 83E1CC39A003059FDF345EB489A93EB37A3AF52360FA5402EDC8697181D3748DC5FA52
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f91d3022d383d5f4598ad74b9eeb16e906eae2be63387c194fd062fc5623cc51
              • Instruction ID: 9a5facd85997aecbfb232fc594e66408585a65dc311d175c894f8624bc029017
              • Opcode Fuzzy Hash: f91d3022d383d5f4598ad74b9eeb16e906eae2be63387c194fd062fc5623cc51
              • Instruction Fuzzy Hash: A1E1CB36A043059FDF345EB489A93EB37A3AF52360FA5402EDC8697181D3748DC6FA52
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ce985251c67f5148a8d8edafb1c8636a5c3982e5689d8a4c60649d8dc78ea227
              • Instruction ID: 84df8116a13b8c38a6238ee0aa71ed8d7dd26f71782ab0a9cd1ba7fcb032767d
              • Opcode Fuzzy Hash: ce985251c67f5148a8d8edafb1c8636a5c3982e5689d8a4c60649d8dc78ea227
              • Instruction Fuzzy Hash: CDD1C836A043059FDF345E7489A93EB33A7AF92360FA5402EDC8697181D3748DC5FA52
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9430e4d7a97d43518d864e4600406c971910585268e8463e264176acd33a3f9f
              • Instruction ID: 8a79c7b7d9749d7e3741fe2802fc55f1a88505c75382ff28ae6785d26b208a86
              • Opcode Fuzzy Hash: 9430e4d7a97d43518d864e4600406c971910585268e8463e264176acd33a3f9f
              • Instruction Fuzzy Hash: ADC19936A043059FDF348E748DA93EB33A7AF56360FA9402EDC8697181D3348985FB52
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: acadd648af0f09bb79539356eaf0d2b61798764d3728d63a2be54d14e76dd218
              • Instruction ID: c038fe91da96ffc9cf3c00dc617dd5a67a0c7b5fe6fa3a65a5987df08ea722ca
              • Opcode Fuzzy Hash: acadd648af0f09bb79539356eaf0d2b61798764d3728d63a2be54d14e76dd218
              • Instruction Fuzzy Hash: 64C127115083828EDB218B7889987D67BD25F13370F59C3EACC954F1E7E7A588C6E712
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
                • Part of subcall function 00F10C21: NtProtectVirtualMemory.NTDLL(-E1512D40,0000003A,0000003A), ref: 00F1147F
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoadMemoryProtectVirtual
              • String ID:
              • API String ID: 3389902171-0
              • Opcode ID: c55a36f9d860e3af0df3f1f5849f82f5649aca944200e54e661202848660dceb
              • Instruction ID: b64da06c4b403625883112d2febc3adf54ebac3d08228b724761a2f6d66691e2
              • Opcode Fuzzy Hash: c55a36f9d860e3af0df3f1f5849f82f5649aca944200e54e661202848660dceb
              • Instruction Fuzzy Hash: 5CC128115083828EDB218B7889987D67BD25F13370F59C3E9CC954B1E7E7A584C6E712
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: b2d8108b784c907cf980d601d4eb463c5269657a3f3d35a59e3a6aa496563754
              • Instruction ID: 5fe1fadf1f7cde8b5f5e24f7e06cd09851840b29317cfb628e2e9c60de18a2a4
              • Opcode Fuzzy Hash: b2d8108b784c907cf980d601d4eb463c5269657a3f3d35a59e3a6aa496563754
              • Instruction Fuzzy Hash: C2B1B935A043059FDF749E788DA93EB32A7AF52360FA5402EDC86D7181D3348D85FA52
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00F10C21: NtProtectVirtualMemory.NTDLL(-E1512D40,0000003A,0000003A), ref: 00F1147F
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoadMemoryProtectVirtual
              • String ID:
              • API String ID: 3389902171-0
              • Opcode ID: 484b0ae342086da24d8efa33e8cbed98594d696a998a2c2e386eef556684107e
              • Instruction ID: 4163b727f907762251c397af18a2e11c1cbacdec54afb03c1b6f505b099d560a
              • Opcode Fuzzy Hash: 484b0ae342086da24d8efa33e8cbed98594d696a998a2c2e386eef556684107e
              • Instruction Fuzzy Hash: 2DB115115083828EDB228A7889997D67FD25F133B0F59C3EACC950F0E7E7A584CAD712
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 4b48483ad69cbc8d2d8c8f45d07beb43909e0fd46a887bd659f6c49932b29582
              • Instruction ID: 3c7c3bb37a0876a554c94b5f33576f72a555a10b18fab5dcba7bb0b770da0869
              • Opcode Fuzzy Hash: 4b48483ad69cbc8d2d8c8f45d07beb43909e0fd46a887bd659f6c49932b29582
              • Instruction Fuzzy Hash: 06919935A043069FEB345E748DA93EB32A7AF56360FA4442EDC86D3182D734C9C5FA12
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00F10C21: NtProtectVirtualMemory.NTDLL(-E1512D40,0000003A,0000003A), ref: 00F1147F
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoadMemoryProtectVirtual
              • String ID:
              • API String ID: 3389902171-0
              • Opcode ID: f759c3e074be2521dce9f82d2c123049faaa64f1a025260b9ca91b46b8e58679
              • Instruction ID: b99e8973dcefe869d37c5083f99fb8caa07fe28a0b0a66cac0efb82c211c1934
              • Opcode Fuzzy Hash: f759c3e074be2521dce9f82d2c123049faaa64f1a025260b9ca91b46b8e58679
              • Instruction Fuzzy Hash: 54A116115083829EDB228A78899C7D66F925F133B0F5AC3E9CCD51F0E7E7A544CAD712
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e725b5d6a5086d76e368bb88dcd1c70ddbf37ccd02101657df3b71240b0e3055
              • Instruction ID: feca06037ac5ce22543dc56206e6904f9f17bd3c8782a851b71bfde3819d496f
              • Opcode Fuzzy Hash: e725b5d6a5086d76e368bb88dcd1c70ddbf37ccd02101657df3b71240b0e3055
              • Instruction Fuzzy Hash: 8AA1F3115083828EDB228A3889997D27FD25F133B4F5AC3EACCD50B0E7E7A5448AD712
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8e2e2826ec16c3dc5cca264d9b64170460b0e450cc5aa361ecf5eea499ecfb57
              • Instruction ID: 06221ea1a0cafb239cd050512b0791d85e1bfa659a08020c4e9b76c1cc3db04d
              • Opcode Fuzzy Hash: 8e2e2826ec16c3dc5cca264d9b64170460b0e450cc5aa361ecf5eea499ecfb57
              • Instruction Fuzzy Hash: 4E91CD39A043019FDF789E7489B93E732A6AF52360F95402ECC86C7091E3758C85FA92
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: dd1898a33935af7e3c0344ff757ae1520bd41c2b2ea913ec509b8bb64a38271e
              • Instruction ID: c6d5c296d1ef440aa4dbeb1409d453f29a12fe6210f530c4fc3bc907386a2c61
              • Opcode Fuzzy Hash: dd1898a33935af7e3c0344ff757ae1520bd41c2b2ea913ec509b8bb64a38271e
              • Instruction Fuzzy Hash: B891A935A043069FDB355E748DA93EA3796AF22360FA5442EDC8693182D734C9C5F612
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0cc9b7b99e3dbe3338dd6eab1dee3c3c4a9c09ebfc45531ffe46224e1c011073
              • Instruction ID: f5dd7acc8158badf2b0e30f1649374eb9b530d527327bd3113f918633a55082a
              • Opcode Fuzzy Hash: 0cc9b7b99e3dbe3338dd6eab1dee3c3c4a9c09ebfc45531ffe46224e1c011073
              • Instruction Fuzzy Hash: 76A1E3115083828DDB228A78899D7D67E925F133B4F59C3E9CCD50F0E7E7A684CAE712
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9c37d2eb33136278127595149f2d2522e42eb9e19a6fe507beff0efb3e5f5a7c
              • Instruction ID: 47ea7c27fe332a45dab56c1bb5ceee90845a446a8873c7589b376d14054beb96
              • Opcode Fuzzy Hash: 9c37d2eb33136278127595149f2d2522e42eb9e19a6fe507beff0efb3e5f5a7c
              • Instruction Fuzzy Hash: DF81793A505201CECF29DFB558706C67BB2FF80354B56436AC8429B1A2D7768887FBC0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f010e2640ebe46a730e324757a4344110d5b4282c9348fecad4431f407f1523f
              • Instruction ID: 74ac7711c34f9d7ad2d414d477ebc28a45fc116d81c9cd9aef34009c781a757e
              • Opcode Fuzzy Hash: f010e2640ebe46a730e324757a4344110d5b4282c9348fecad4431f407f1523f
              • Instruction Fuzzy Hash: C181A27A915101CECE3CCFB9947668277A1FB90369756856AC403CF0B0E6B64C97BEC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b5f904cda7ca1816b148f1c7578e5b414e12df48a0dbb6532af032fd089931d2
              • Instruction ID: e4c1662b21fdb5ee173d06fd148544c8d7e97ce99f2a3e5035d9a49f339f47d6
              • Opcode Fuzzy Hash: b5f904cda7ca1816b148f1c7578e5b414e12df48a0dbb6532af032fd089931d2
              • Instruction Fuzzy Hash: 5981BB35A043069FDF389E748DB93EB32A6AF52360F95402EDC86C7181E73589C5FA52
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 42d8d007102cf0fe858a463b7a92fb0e80183018b90f6243091ae6ee99456456
              • Instruction ID: 2cf054557162140fa98318eb3c7938b93056d2c08ac2e6011015949fa7352f7c
              • Opcode Fuzzy Hash: 42d8d007102cf0fe858a463b7a92fb0e80183018b90f6243091ae6ee99456456
              • Instruction Fuzzy Hash: 0191D3115083828DDB218B78899D7D6AF925F133B4F5DC3E9CC950F0EBE7A6448AE712
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 530eb998cdd367840c2da9852dcfb2f10d55791bc6da023c3d992fff9bba74d8
              • Instruction ID: c6b19e727ce437e9e3e9a42c6cc6a4e2334bf40c1daa1358ab389425f115ed97
              • Opcode Fuzzy Hash: 530eb998cdd367840c2da9852dcfb2f10d55791bc6da023c3d992fff9bba74d8
              • Instruction Fuzzy Hash: 8B81647A915500CECE3DCFF9587625273A1FB503687AA516AC806CF0B4E26B4897FDC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b3f031342861bcdacfb0b687aa99ce0c01d82f1e9dc77d63bfeb517ae821c1f6
              • Instruction ID: 2fb6a6c241c608beb7ab839226b029baa95bac8a3f93804f59e4969839dca4f7
              • Opcode Fuzzy Hash: b3f031342861bcdacfb0b687aa99ce0c01d82f1e9dc77d63bfeb517ae821c1f6
              • Instruction Fuzzy Hash: 5871707A926500CECE3CCF79687625273A1FBA035C79A4D6AC042DF0B0F5A65897BDC1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(?,?,00003847,00000000,00F008F8), ref: 00F0EB85
              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 890d7fbf7309fa15a018b6cd2551c618f35b60b3df451e91277961d5a884c5bc
              • Instruction ID: 38d49852da363ed49d40293b3d9f292c48a20443056daca12f44fe099c437289
              • Opcode Fuzzy Hash: 890d7fbf7309fa15a018b6cd2551c618f35b60b3df451e91277961d5a884c5bc
              • Instruction Fuzzy Hash: C181E5115083828DDB218A78899D7D6BBD25F133B4F59C3E9CC950F0DBE7A684C6E712
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 877a4673418df60856c080fa7ebdaba610add38d70243886454190f456433dbb
              • Instruction ID: d9348f9b115bafb44125af7a3a028201810d0bbe083544f12e9a302e2e335db4
              • Opcode Fuzzy Hash: 877a4673418df60856c080fa7ebdaba610add38d70243886454190f456433dbb
              • Instruction Fuzzy Hash: E5819F3A915600CECF3DCEFA547635377A1BB90368B66416AC806CF0B0E6A64D96FDC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b3a1b54456070afe23887386d92b82c642058446d72bcfdea3995cb4d4d717a0
              • Instruction ID: 98c15d170fd448b5ed62743973af06d8a4e9c91bbd43e0482e9cab3a6f2e3df1
              • Opcode Fuzzy Hash: b3a1b54456070afe23887386d92b82c642058446d72bcfdea3995cb4d4d717a0
              • Instruction Fuzzy Hash: BC71DE35A043019FDF749E744DB93EB7296AF52360F99842ECC82C7091E36588C6FA92
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 72d2530f06eb1ed98327f349ad9dca7a62dba53f56a616de820809c348656cac
              • Instruction ID: 4a1240824a4971eb2f42ea5838d14f933a0df9f4fa6111e161457dc4f80224ed
              • Opcode Fuzzy Hash: 72d2530f06eb1ed98327f349ad9dca7a62dba53f56a616de820809c348656cac
              • Instruction Fuzzy Hash: EF71AC35B043169FEB346D648DA93EB3296AF66360F98442EDC86C3181D734C9C5FA12
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5de497ef6ce17d5b45fac099229c0518b68f5828082e9347cf353c8cd421c4de
              • Instruction ID: 352fac2491eaf6076b87e87b7cf82008b9c4808d01627cb7ff8b51d2125471eb
              • Opcode Fuzzy Hash: 5de497ef6ce17d5b45fac099229c0518b68f5828082e9347cf353c8cd421c4de
              • Instruction Fuzzy Hash: E3716776604605CFCF38CF288865BD737A6BF91350F55412EDC45CB280E7769D4AAB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4f791a9afcd4ed52ccf7ef966910553184ab52c288f62e81ef839d7b6197ae50
              • Instruction ID: 8d12934e2bc64dc857ba7a68eab4d088d8a1f40211eae09a84666c353fb87324
              • Opcode Fuzzy Hash: 4f791a9afcd4ed52ccf7ef966910553184ab52c288f62e81ef839d7b6197ae50
              • Instruction Fuzzy Hash: BF7136BA904240CFCF38CF389C253D233A2BF41358F96416ACD469B1A0E7365996BEC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8c6ac5420e6cf5f2e7f926895b405c1b0bb49083fea631ab6fb36846c70d0bf1
              • Instruction ID: 2a95197ff575a4bfad5cef2a7c6ad01d70268dfbb18731dfbcfeb64952ee9a1d
              • Opcode Fuzzy Hash: 8c6ac5420e6cf5f2e7f926895b405c1b0bb49083fea631ab6fb36846c70d0bf1
              • Instruction Fuzzy Hash: 7D715A72704605DFDF388E28C8A57DB37A6BF56350F61422EDC89CB280D7759D86AB80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9ef22c17908979c879a244ad71da6119560df52ae835492394d136a6046ee1e3
              • Instruction ID: 973dd3a1403ae6cb9f977a79285884dd758d8eb08caa45f1fdd806203610e5c9
              • Opcode Fuzzy Hash: 9ef22c17908979c879a244ad71da6119560df52ae835492394d136a6046ee1e3
              • Instruction Fuzzy Hash: 53610175B08741CFDB24DE3989A47EBB7F6BF94380F56802DDC8987164D7314A82AB02
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 755e8b3713733f6a7993596c68db29107b26f2779bc4d8e33c20a726e73c3eeb
              • Instruction ID: a6457561d0ffbaa41ca6cb242e861a76cd308e2353f14e0870c010ce034857aa
              • Opcode Fuzzy Hash: 755e8b3713733f6a7993596c68db29107b26f2779bc4d8e33c20a726e73c3eeb
              • Instruction Fuzzy Hash: 4E5159118083824ADF258E7889997D7BB925F133B0F59C3A9CC925F0DBD7A644C6E613
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bc865055286b2daa7af5e85cfc62dfa34137b81a5362a11184755e4206f54c4c
              • Instruction ID: 822838518fb99f8716ae4d502c34ea2060c3292621cc68bcfd4e76927653ca47
              • Opcode Fuzzy Hash: bc865055286b2daa7af5e85cfc62dfa34137b81a5362a11184755e4206f54c4c
              • Instruction Fuzzy Hash: B7511776604306CFCF349E758CA43EB37E2AF55360FA5402EDC86DB055E7718991EA42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5733f14f5279e7a72b79332832db126a10a39dae201faf69176d9e38516d2716
              • Instruction ID: 3978edd4c216aee5dc2184742f9a95e00f9bf3b60cd3aa95f6dff79f2fb091fc
              • Opcode Fuzzy Hash: 5733f14f5279e7a72b79332832db126a10a39dae201faf69176d9e38516d2716
              • Instruction Fuzzy Hash: 26511576604305CFCF389E7588A47EB36E2BF55360FA6802EDC86DB154D7718891BA42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 1266a25510d019b565e2b954f75ae6cd6ec0700fe09158c2cd0d07d597d1e17a
              • Instruction ID: f44168b052810e784cd5a8212537e18213310b11f56b6b613885c8ec25152e9c
              • Opcode Fuzzy Hash: 1266a25510d019b565e2b954f75ae6cd6ec0700fe09158c2cd0d07d597d1e17a
              • Instruction Fuzzy Hash: 0251DA35A04302CFDF34AE7189B93EB32A6AF52360F55842EDC8287191E7758985FA52
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 66dcb81a5eb4f80d18b5c7b77d67d7fd373e8e952fe3c58b9f4aee2dc9965baa
              • Instruction ID: d836a71fcaca0155c94bf812619116f1e0fb64862272477b6c5951c14145318d
              • Opcode Fuzzy Hash: 66dcb81a5eb4f80d18b5c7b77d67d7fd373e8e952fe3c58b9f4aee2dc9965baa
              • Instruction Fuzzy Hash: 1A51C17AA05600CFCF2CCF3994B578377A2FF90354B97896AC8469F160E2729D55EAC0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 001d15c9716934398e00f5f3f0f580a5037226ae0e1fb63ff1a40684b88f0e6d
              • Instruction ID: a6ce6a39a40ebc45ed8c16b8fd9158cce8db08fb8790a889647aefd5d893b859
              • Opcode Fuzzy Hash: 001d15c9716934398e00f5f3f0f580a5037226ae0e1fb63ff1a40684b88f0e6d
              • Instruction Fuzzy Hash: EB41D37E914501CECE3CCEBA507675332A5BB81369B97863AC8029F470F5A64C8ABDC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0097aa57170223a1e910ced985d25625ec6ed3ab1e76098664e92eedb8e14f69
              • Instruction ID: f112045d9edad1c7c4a6e0567f04d76c932edd273ce756acee18d7959f6ba4aa
              • Opcode Fuzzy Hash: 0097aa57170223a1e910ced985d25625ec6ed3ab1e76098664e92eedb8e14f69
              • Instruction Fuzzy Hash: D15149BA904245DFCF38CF788C653E637B2BF40354F96412ACC8A9B1A4C7351986AB81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 77329613ab56e7db98ba3aa6204f2de11ad38a22bf988eea43f5bf898b6129e5
              • Instruction ID: ad91c85909047004ad5e88289d80ac24171d47337145ee9fa097a9425bc6f22f
              • Opcode Fuzzy Hash: 77329613ab56e7db98ba3aa6204f2de11ad38a22bf988eea43f5bf898b6129e5
              • Instruction Fuzzy Hash: 5451CE35B08745DFDB24EE798D947EEB7E2AF99380F55802DDCC993158D7304A81AB02
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d1b5575256d14f49fb40e3cbaecf395ca8fd4e673aac89f2dc9fbbc2811978e3
              • Instruction ID: 1b927e0699cbec7b1405f99bb1317cd66a870c3a2117f7b6b9606109c6480bb5
              • Opcode Fuzzy Hash: d1b5575256d14f49fb40e3cbaecf395ca8fd4e673aac89f2dc9fbbc2811978e3
              • Instruction Fuzzy Hash: 2C4147218083824ADF258E7889997D7BBD29F533B4F55C3A9CC924F08FD7AA44C6D613
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8fc85da8976e03820a1162af974577fd350c3c843361685b07bf9adeea49a7c9
              • Instruction ID: 1ab8946526e4e70f56ca72efc56ad43b85ec83d14599d6fad8b164b91dfb00d4
              • Opcode Fuzzy Hash: 8fc85da8976e03820a1162af974577fd350c3c843361685b07bf9adeea49a7c9
              • Instruction Fuzzy Hash: 8351A07A915101CECF3CCE76547674377A5BB80359B57C96AC8039F0B0E2B25D46BAC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f491dc3d26e31b8380322ab9e16da33fd995e083e869e37e0314f0ff92f6db7f
              • Instruction ID: 1faefb0c6fc0b269f029c6f34ba7cae1d083711ee456450087744e48079bd57d
              • Opcode Fuzzy Hash: f491dc3d26e31b8380322ab9e16da33fd995e083e869e37e0314f0ff92f6db7f
              • Instruction Fuzzy Hash: 8F41B67AA09200CFCF3DCFA594B579377A5BF90358B66446BC8028F1A0E6755D42FAC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 695432de90b10b4d9b4d56a944366779a0d9d8807c9cce74a8e500cc9375b7b4
              • Instruction ID: 8ca3462f20e6def50873c797e3a959de79877490306e6c36003c2e4b6a1355ca
              • Opcode Fuzzy Hash: 695432de90b10b4d9b4d56a944366779a0d9d8807c9cce74a8e500cc9375b7b4
              • Instruction Fuzzy Hash: 6941DF7A902500CFCF2CCF3994B274377A1FF90358B574D6AC8429F1A0E2629C96BAC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f006b02b2950102b3432c162b662890a8dfce8eddd1a18234feb5e4a3846415c
              • Instruction ID: 4c3e20315cb35163ac5a9da45165a8b5a11142c80f32561aee58701bfd6b6314
              • Opcode Fuzzy Hash: f006b02b2950102b3432c162b662890a8dfce8eddd1a18234feb5e4a3846415c
              • Instruction Fuzzy Hash: DC41B07AA15200CECF3DCF76947674332A2BF90358B57496EC4128F0B0E6B65956FAC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d3b366cbf57cac6d8e22a33915099952634955291ff75eef5040ba17fd9d305f
              • Instruction ID: 7343b0d10cb640d3af6a122c2381de3899ac907ad18994bdb8d7c4c37d4a081c
              • Opcode Fuzzy Hash: d3b366cbf57cac6d8e22a33915099952634955291ff75eef5040ba17fd9d305f
              • Instruction Fuzzy Hash: 3C31FB6E914102DECE3CC9B904763A732956F81365FA6823BCC429B474F59688CABCC2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a2b64331861e51d9c7a21b879f852602c4aaafcd660fa11deaf07e6905c4f4e4
              • Instruction ID: 01b9970064f8c8c2140d9b180838e01ad9de8c9fa88133e8feb5ef03b6db5230
              • Opcode Fuzzy Hash: a2b64331861e51d9c7a21b879f852602c4aaafcd660fa11deaf07e6905c4f4e4
              • Instruction Fuzzy Hash: A341F976D00305CECB398E2899A53D333A6BF55324F56423ACC814B5A4D7764D8EEAC2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6ac2bc62d25b157e9bffa0bc5cd0c0fa14cbc35278737ac308056a4a3d8730af
              • Instruction ID: 3da9985c3de8529a3c021df5595bc3a471b4918552bba6d91aefa74579897202
              • Opcode Fuzzy Hash: 6ac2bc62d25b157e9bffa0bc5cd0c0fa14cbc35278737ac308056a4a3d8730af
              • Instruction Fuzzy Hash: 154114658083828ADF259E7888997D7BAD25F533B0F19C2A9CC924E0CFD7B644C6D613
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2222e0b6f47d0846e55273db6ab7611a6b94abcd5aee9b6d74c99a7859511ba6
              • Instruction ID: 81f783f9fbc528279466fa7561af5b0532741200fa35907504663aabcfa41a62
              • Opcode Fuzzy Hash: 2222e0b6f47d0846e55273db6ab7611a6b94abcd5aee9b6d74c99a7859511ba6
              • Instruction Fuzzy Hash: 9131D27A911502CECF3DCF7A507674376A5FB8035A793887AC843CE071E6A64C86B9C1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c8430a4f13a5dd75eb9d001ee3bc60e6e67b18c52dc5aced57b68c70893c269f
              • Instruction ID: 13980f79b93d0fb51df45e813ddd2d994dce9fa9c527417b5a16f9a927b55759
              • Opcode Fuzzy Hash: c8430a4f13a5dd75eb9d001ee3bc60e6e67b18c52dc5aced57b68c70893c269f
              • Instruction Fuzzy Hash: 7541F876D00301CEDF388D2899A53D33266BF55314F96423ACC824B5A4D3764DCAEAC3
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8155cda4584ab7a21a6138d8d4630592fe39b9bc830b60461a6cc39cab33b7c1
              • Instruction ID: 4e581f0bc87b97b143f25c4219e43698476fca973848ae1fa45a507880c14eb6
              • Opcode Fuzzy Hash: 8155cda4584ab7a21a6138d8d4630592fe39b9bc830b60461a6cc39cab33b7c1
              • Instruction Fuzzy Hash: E641B67B905100CFCE3DCF76547674336A6BB90258B97457AC802DF470E2B69D8AAEC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a2875a3208a8d61c26f820cb0542d11ca6ca07345653a7088e8c0fbb6961dfea
              • Instruction ID: 3536bc1cceb456067bc0f645116f5f9642fad99082c006a57068eb0c1e5a4d79
              • Opcode Fuzzy Hash: a2875a3208a8d61c26f820cb0542d11ca6ca07345653a7088e8c0fbb6961dfea
              • Instruction Fuzzy Hash: 2E31B27691D600CECF2DCE7A507634336E6BB91364B97816AC4028F1B2F6E68D46B9C1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 49dbc98df862289728a6e88bef0a1d3aa4fcff1f1319f00c1ef68d49543ec428
              • Instruction ID: ef88fa70f0ce833dd5ac6457c3e52c53d7b31a862aeb22a69c34cc888c96706b
              • Opcode Fuzzy Hash: 49dbc98df862289728a6e88bef0a1d3aa4fcff1f1319f00c1ef68d49543ec428
              • Instruction Fuzzy Hash: 3D315D3AC14101CECF2CCEB5503539337BAAF81355B92415BC8438F0B5E6A64E87B9C1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5a1dabf2648704c1e683461ed484f0c1008963f7402a347e2457416f60594196
              • Instruction ID: 482df9d366ba075b0b664bb324723a183f9bcfe149a9b03adf2f9b1cdea63d9d
              • Opcode Fuzzy Hash: 5a1dabf2648704c1e683461ed484f0c1008963f7402a347e2457416f60594196
              • Instruction Fuzzy Hash: 203168B6A012048FDF388E3988B53C73766BF91350F62452EC9428B1A0E3765985DAC2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d2ddaa60304823de3cd492ca425c40fb68cf86fdabcb31cd146da73c78d722d0
              • Instruction ID: 688b644a78aab2b046286b9eb725f73fc28f2712df6dfd31e7f94a3ea3d72b2d
              • Opcode Fuzzy Hash: d2ddaa60304823de3cd492ca425c40fb68cf86fdabcb31cd146da73c78d722d0
              • Instruction Fuzzy Hash: E0318F7AA05200CFCF7DCF7684B278376A6BF90314F56496EC8128F0B0E6B65945AAC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b98803264e8ab3a888513ce1860d95bfb4bea91ce7932a1da6fa1eb5968f9cc6
              • Instruction ID: 47e821097f703dff27a10c601468a9511e4b5a8673ac9a1cba2053e7bf2bcbc9
              • Opcode Fuzzy Hash: b98803264e8ab3a888513ce1860d95bfb4bea91ce7932a1da6fa1eb5968f9cc6
              • Instruction Fuzzy Hash: E1310B36C14380CECF3DCF3450BA787BA61BF45358F0682AEC5428E065E6A608C6DAC2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f3b99623a60262c584be6f1757659946d655acd755ebbce556166e9d97c88655
              • Instruction ID: dc7f8842660a52cc305efd2fcf12b8ce77391ff60884f807ed6c847a41249a0d
              • Opcode Fuzzy Hash: f3b99623a60262c584be6f1757659946d655acd755ebbce556166e9d97c88655
              • Instruction Fuzzy Hash: 8A2168B260038A8FEB340E28CCE53DB3667AF52750FA1051FDD8B97680D3358585D702
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3f2ec009bd53841cb92886c7aa0f4dc9a4f8d7c4d09c38c6b4bb22a8d135029c
              • Instruction ID: ad51e3e9cef01e8f7006fcc1f22aec337a1234e55581b5829e2e21c8aa2e8af5
              • Opcode Fuzzy Hash: 3f2ec009bd53841cb92886c7aa0f4dc9a4f8d7c4d09c38c6b4bb22a8d135029c
              • Instruction Fuzzy Hash: D12127B6901201CECF38CF79D8B17C33666BF80354F62412EC9469F1A0E7B65985EAC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1bda9f90d7229026127aa7cda84d5c5653af538560fc67a9c13bf13895d1b5aa
              • Instruction ID: 6bbb336a2d4f293d1018f615cdcff39ebba63733af5aa136d623e9c4bc9d7a27
              • Opcode Fuzzy Hash: 1bda9f90d7229026127aa7cda84d5c5653af538560fc67a9c13bf13895d1b5aa
              • Instruction Fuzzy Hash: 48214079C143018ECF38CA34407B3877651FF91394F02C67DC8438A069E5A108C395C2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a38df9a9213e027559d2bedecd3c7d118fb0ce17c735a93971b521164d9d17ee
              • Instruction ID: 31ba20293b1e1cd6f3b397f421e4ef4d3b4f58e58c27ac9e58936cc9e4204a6d
              • Opcode Fuzzy Hash: a38df9a9213e027559d2bedecd3c7d118fb0ce17c735a93971b521164d9d17ee
              • Instruction Fuzzy Hash: 2321F93AC14340CECF3DCE3550BA797B665BB55368B06826EC5928A075E6A609C29AC2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 42ca2e1530ea6f0480005cbad0f510a6eb1cffdcce1476472ebc6d775923afa8
              • Instruction ID: 4e4d633c16b58c2a8f78e5857fe3fb1896901b669905119e12b5e2646c218b09
              • Opcode Fuzzy Hash: 42ca2e1530ea6f0480005cbad0f510a6eb1cffdcce1476472ebc6d775923afa8
              • Instruction Fuzzy Hash: 65212931659305DFEF642E3489617FBBBE2AF423A4F97092ECDC396450E72188859B03
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 23233d7b0efc2c23addb09fb04198846cf37ec248697273262d74c93111440ec
              • Instruction ID: c744729639dc4ba4a74af094acfb7630a32af056a540722d796f909e8acbd5da
              • Opcode Fuzzy Hash: 23233d7b0efc2c23addb09fb04198846cf37ec248697273262d74c93111440ec
              • Instruction Fuzzy Hash: 13119F3A905600CECF3DCE36947230377A2BB90269797867EC4429E4B4E2B60C5AA9C1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7ce8086fc373080357a1120c3d2f07317dec77043de4679a1837c8c830a318dd
              • Instruction ID: acab0ec8818f423a94e0b31308276efe873dbb0f0d161540ff0f2768046f9c7e
              • Opcode Fuzzy Hash: 7ce8086fc373080357a1120c3d2f07317dec77043de4679a1837c8c830a318dd
              • Instruction Fuzzy Hash: BF11937AA05600CFCE3DCFFA507660336A5BA80358793416AC402CE0B0B6AB0DA6FDC1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e8adbda0bc4359cb6dfffd71b496ab3296117a145a8ec3d0cbbe552511316964
              • Instruction ID: bf782ffec98065b4353be97200cf90d80e4a82b51dd95af7f614f76a2095da3f
              • Opcode Fuzzy Hash: e8adbda0bc4359cb6dfffd71b496ab3296117a145a8ec3d0cbbe552511316964
              • Instruction Fuzzy Hash: A5F09076710200CFDB30CE28CAD0B9973A2AF58790F514439E84ACBAA1D330DC49FA10
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5f67303aa29363061933f8f70203a5489b5739b2c7195129706f6592e8591633
              • Instruction ID: 6d2acfcdd9c4cdd606b5a8e9d514316f1967baf927ccd7da21d9071205148cf4
              • Opcode Fuzzy Hash: 5f67303aa29363061933f8f70203a5489b5739b2c7195129706f6592e8591633
              • Instruction Fuzzy Hash: 08E0EDB1611381DFD714CA38C4C0B1577A0BF467A4B608168E845CF7A2C222E844AB00
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000017.00000002.465559603.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_f00000_RegAsm.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 91b56d7fce6a1fa36ba05ec4c6bc2688cff152389919c73e78ffa06673968d15
              • Instruction ID: 786e6ffa97e74926978100051f5918d4af56b6f0c3086d0e5ef4286e4a8b7f02
              • Opcode Fuzzy Hash: 91b56d7fce6a1fa36ba05ec4c6bc2688cff152389919c73e78ffa06673968d15
              • Instruction Fuzzy Hash: 1AB00975665A858FCA96DA09D2A0E81B3A5FB58B60F825890E456CBA62C268E940CA10
              Uniqueness

              Uniqueness Score: -1.00%